diff options
Diffstat (limited to 'ansible_collections/cisco/ise')
476 files changed, 3882 insertions, 5091 deletions
diff --git a/ansible_collections/cisco/ise/.DS_Store b/ansible_collections/cisco/ise/.DS_Store Binary files differindex 844cf6e75..f79cfc1f5 100644 --- a/ansible_collections/cisco/ise/.DS_Store +++ b/ansible_collections/cisco/ise/.DS_Store diff --git a/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml b/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml index 6928df134..dd455afad 100644 --- a/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml +++ b/ansible_collections/cisco/ise/.github/workflows/sanity_tests.yml @@ -14,9 +14,8 @@ jobs: strategy: matrix: ansible: - - stable-2.12 - - stable-2.13 - stable-2.14 + - stable-2.15 - devel runs-on: ubuntu-20.04 steps: diff --git a/ansible_collections/cisco/ise/.vscode/settings.json b/ansible_collections/cisco/ise/.vscode/settings.json index a7d0fc7b7..4f6146612 100644 --- a/ansible_collections/cisco/ise/.vscode/settings.json +++ b/ansible_collections/cisco/ise/.vscode/settings.json @@ -1,3 +1,24 @@ { - "esbonio.sphinx.confDir": "" + "esbonio.sphinx.confDir": "", + "ansible.python.interpreterPath": "/usr/local/bin/python3.10", + "workbench.colorCustomizations": { + "activityBar.activeBackground": "#65c89b", + "activityBar.background": "#65c89b", + "activityBar.foreground": "#15202b", + "activityBar.inactiveForeground": "#15202b99", + "activityBarBadge.background": "#945bc4", + "activityBarBadge.foreground": "#e7e7e7", + "commandCenter.border": "#15202b99", + "sash.hoverBorder": "#65c89b", + "statusBar.background": "#42b883", + "statusBar.foreground": "#15202b", + "statusBarItem.hoverBackground": "#359268", + "statusBarItem.remoteBackground": "#42b883", + "statusBarItem.remoteForeground": "#15202b", + "titleBar.activeBackground": "#42b883", + "titleBar.activeForeground": "#15202b", + "titleBar.inactiveBackground": "#42b88399", + "titleBar.inactiveForeground": "#15202b99" + }, + "peacock.remoteColor": "#42b883" }
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/FILES.json b/ansible_collections/cisco/ise/FILES.json index c2d105878..4c183e093 100644 --- a/ansible_collections/cisco/ise/FILES.json +++ b/ansible_collections/cisco/ise/FILES.json @@ -11,7 +11,7 @@ "name": ".DS_Store", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1188de753911b2e8f232a8c9e3a0df7707182b5c765a589e8f62825dad126456", + "chksum_sha256": "437cf9da8611bcc8837aef2444e9e00fc44f8f071f750224be185a74168f2e5f", "format": 1 }, { @@ -25,7 +25,7 @@ "name": "requirements.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea92856a54fce9950dccb45def09112f0de768a7894c8de6adf6b4cb83897491", + "chksum_sha256": "b5a620581f1eb701a6e7bce54457bc44c196732cc5b8d82ae728c285e8d51264", "format": 1 }, { @@ -36,6 +36,13 @@ "format": 1 }, { + "name": "plugins/.DS_Store", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "389b6b15b162e5db97c1c6d4ddc0f1161590c016eb06e49734d10373aabc3c56", + "format": 1 + }, + { "name": "plugins/doc_fragments", "ftype": "dir", "chksum_type": null, @@ -46,7 +53,7 @@ "name": "plugins/doc_fragments/module_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1a39e66ef125592960d7d3972a30ad82ee4dbcd35d0c07052b316e6694d71a57", + "chksum_sha256": "3c03cbe8b754daa452f52e5932003010e140e2861da753a1f51ff43b7879dfc2", "format": 1 }, { @@ -60,7 +67,7 @@ "name": "plugins/doc_fragments/module.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d33685ce2c04ce923d703730ed78cfadb6a97d44c5e3441471d2dc1171ca059", + "chksum_sha256": "53a1c31be129aeaa4e9308845221e148e9cff3d6a13ae43ea05ba2358dfb3953", "format": 1 }, { @@ -99,6 +106,13 @@ "format": 1 }, { + "name": "plugins/action/test_connector.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f16380be3ff68f3e263a612f4a051c045e84dda1eeb5f635d5317b26ec9b8c7e", + "format": 1 + }, + { "name": "plugins/action/network_device_group_info.py", "ftype": "file", "chksum_type": "sha256", @@ -130,7 +144,7 @@ "name": "plugins/action/node_services_profiler_probe_config.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "84dc398a3fb106bb1e292098694c9771230a007387778b66a7929596f0097e6b", + "chksum_sha256": "7be342544dfbae8faf4f698ecd0038b92d8570831cff0667502502894d496bc9", "format": 1 }, { @@ -169,6 +183,13 @@ "format": 1 }, { + "name": "plugins/action/dictionary_references_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a03f8b3e5467296dee3f555d61ebed7b93c74a7e7e527b40fa52a42d90164819", + "format": 1 + }, + { "name": "plugins/action/anc_policy_info.py", "ftype": "file", "chksum_type": "sha256", @@ -183,10 +204,10 @@ "format": 1 }, { - "name": "plugins/action/trustsec_sg_vn_mapping_bulk_delete.py", + "name": "plugins/action/configuration.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "72efae5dd74552743f1f3b89f21d0bc39341c4fbea70d4c25552ebe56b5644e1", + "chksum_sha256": "28c31c878ee196752d7c003c4c69720b4dd5251739ca70de97cc0001547dfdad", "format": 1 }, { @@ -246,13 +267,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_sg_vn_mapping_bulk_update.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "97378c6cf992ca1cbcf06dbd5e5df21a11b02706a6af667cddefa4f382cb97ca", - "format": 1 - }, - { "name": "plugins/action/node_group.py", "ftype": "file", "chksum_type": "sha256", @@ -263,7 +277,7 @@ "name": "plugins/action/personas_export_certs.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "21164d32f135f20df72386358435b9860295fc71fbcdcbe60be1c174c4bd2f1d", + "chksum_sha256": "b73decde11488e39b11d2d7605b69a91d8987967b41b900a42dea24d85e02e0f", "format": 1 }, { @@ -288,6 +302,13 @@ "format": 1 }, { + "name": "plugins/action/subscriber_imsi_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "91ef4ff7daa43a4895cc80a845d0c66f2ccaa9e1b57d833e651e4a6557374f8f", + "format": 1 + }, + { "name": "plugins/action/id_store_sequence_info.py", "ftype": "file", "chksum_type": "sha256", @@ -330,6 +351,13 @@ "format": 1 }, { + "name": "plugins/action/configuration_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "ec026ed478f51cedfce03de9d8ed59e78f59d414f74061f0d324ae128f93a082", + "format": 1 + }, + { "name": "plugins/action/guest_user_bulk_request.py", "ftype": "file", "chksum_type": "sha256", @@ -375,7 +403,7 @@ "name": "plugins/action/node_primary_to_standalone.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "33fc439728a3a05cc2323aa9eaaa36dce606ff886dc203d1a44670cd09c074c3", + "chksum_sha256": "43bbca7b7f51510a95fef2d707cbeee0f752c9697b7cb5e2d8f977c0d776b9c8", "format": 1 }, { @@ -407,17 +435,17 @@ "format": 1 }, { - "name": "plugins/action/trustsec_sg_vn_mapping_bulk_create.py", + "name": "plugins/action/node_deployment_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df2afad6de41d420e5c5a3716a3f112331c70506ba860775426ce1f9bac16129", + "chksum_sha256": "58c048cec4d4f1f244137605d60a27c494aa193d3f13781a9fbddfda20a5db99", "format": 1 }, { - "name": "plugins/action/node_deployment_info.py", + "name": "plugins/action/subscriber_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58c048cec4d4f1f244137605d60a27c494aa193d3f13781a9fbddfda20a5db99", + "chksum_sha256": "16469a8610935851ae04741fd71adc955a98359756b03e0084d0d3f5e285fb0a", "format": 1 }, { @@ -501,7 +529,7 @@ "name": "plugins/action/network_access_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bcfba88947aa3db19d5ec0ca97a7558cea519234df5b6cb6db16f3be50cff524", + "chksum_sha256": "bdb109d68e3d2699c5991c4c8a090d81175010616ece761a5740e421be73ea13", "format": 1 }, { @@ -564,14 +592,14 @@ "name": "plugins/action/device_administration_local_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b242009a913fb7f493e118ec20f74cd5bed022652f6789e691db4449b6dd0dad", + "chksum_sha256": "2dbdf71eddcf95352dc2964af1fd12c4557f7b40d43d639ab4608882d6050a9b", "format": 1 }, { "name": "plugins/action/system_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "874b1a05952b04d49958aff03461a4f0d1d9135ffa12099a35d81cf97f513ade", + "chksum_sha256": "cc4b608a73575c36fdaa8f1c7beedcc9dd121f1165e999acf4082e8b93e7dc18", "format": 1 }, { @@ -589,13 +617,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_nbar_app_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "93ae77bc17fcfe76eb305f88b20992efce60b9367aa1e4b0306da7f7b2fb7d6a", - "format": 1 - }, - { "name": "plugins/action/tacacs_server_sequence.py", "ftype": "file", "chksum_type": "sha256", @@ -634,7 +655,7 @@ "name": "plugins/action/network_access_global_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "04b0464c0709a4743546f93a1401e3dd0fe96bf7298ef5e61447951b85320e3e", + "chksum_sha256": "e2ad4f96a0e00267a93cf134a1e1606bc3446c245ca04ba650a83525b20e2820", "format": 1 }, { @@ -659,6 +680,13 @@ "format": 1 }, { + "name": "plugins/action/dataconnect_settings_password.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "767abf8104ce3772b9657a8a4be56f87c97dc33355572e59587f828d29c01770", + "format": 1 + }, + { "name": "plugins/action/pan_ha_update.py", "ftype": "file", "chksum_type": "sha256", @@ -676,14 +704,14 @@ "name": "plugins/action/network_access_time_date_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dad8895e0633822fd6e2b57fdcbaa9a9316b8131183c4559d2478c0e64d4678d", + "chksum_sha256": "fd6181558a6ab7b5e026b3ec098cedea9ba109d00ecf61e8b400c3d147698963", "format": 1 }, { "name": "plugins/action/device_administration_time_date_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5cbe37385d8e632876e49433e343488730535ca4497a25823b341d63c2903e05", + "chksum_sha256": "c7adf3188769d12e91f1a0c0832d8acfe994fad2f6196a081507adcb52221ae7", "format": 1 }, { @@ -736,24 +764,24 @@ "format": 1 }, { - "name": "plugins/action/trustsec_sg_vn_mapping_info.py", + "name": "plugins/action/tacacs_server_sequence_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "52ad97481f4cb4a604e5a4ab40f310400f73e261a30264d879bd60e40c79f8fc", + "chksum_sha256": "008f9abdadca0fb0e8bbb1109a6f070042b8329d4005b54f64c22057107953f8", "format": 1 }, { - "name": "plugins/action/tacacs_server_sequence_info.py", + "name": "plugins/action/sg_mapping_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "008f9abdadca0fb0e8bbb1109a6f070042b8329d4005b54f64c22057107953f8", + "chksum_sha256": "b23dc598542aea533c99eacce9a84756cafaf372c951daac5c82ef8450adae9c", "format": 1 }, { - "name": "plugins/action/sg_mapping_group_info.py", + "name": "plugins/action/dataconnect_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b23dc598542aea533c99eacce9a84756cafaf372c951daac5c82ef8450adae9c", + "chksum_sha256": "54c74d4796a53e5dcf6ddee6510b309ce8e2037f91eb6aa2929c394de2192ee4", "format": 1 }, { @@ -788,14 +816,7 @@ "name": "plugins/action/device_administration_authentication_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3c48c5587324e5d8edee6374acb940626c44b2f206b4ffac269a7c8d369f56b5", - "format": 1 - }, - { - "name": "plugins/action/trustsec_sg_vn_mapping.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "90fc4c8b3322a0a1669dbf5564466295da5d576b6642d1466cd39a38c9af452b", + "chksum_sha256": "c93ef8fc9e50d073a8c5c6f47f6eae589b6e32462f27d950cdbf16928f953005", "format": 1 }, { @@ -809,7 +830,7 @@ "name": "plugins/action/network_access_authentication_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "32448b1e8e9d9f908618ce9dc9a70c31b1ad6ced4741e1f2824d1a86a63026b0", + "chksum_sha256": "2e7b8a6fa1ea028935242cd364d7f34397e63d5ad1eadacfd98bdfc4af61bc84", "format": 1 }, { @@ -837,7 +858,7 @@ "name": "plugins/action/rest_id_store.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "24c7aca53602a189ac7952e6ed62d6977ba83d9682a651019549f346894a7f82", + "chksum_sha256": "3da2434a0c5bfe546c46cd039174d8377690efe131403da72df075285d98a2d9", "format": 1 }, { @@ -904,6 +925,13 @@ "format": 1 }, { + "name": "plugins/action/subscriber.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "029e75c9c59feedc8a1dbb5bf26e453f5728b2100bc92587708ac63a40e57bbb", + "format": 1 + }, + { "name": "plugins/action/pxgrid_endpoints_by_os_type_info.py", "ftype": "file", "chksum_type": "sha256", @@ -925,13 +953,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_update.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "92e76bf9f97b9cba899dc48aba011d2f0dbb49cf2740866419681ae32ad748d0", - "format": 1 - }, - { "name": "plugins/action/licensing_smart_state_info.py", "ftype": "file", "chksum_type": "sha256", @@ -949,7 +970,7 @@ "name": "plugins/action/personas_update_roles_services.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6dbfec95a26d9be42a6b7e8afc9b74ab8978974b5447d269584f38fd4641947c", + "chksum_sha256": "9a594f0037e892cf08604d8ce5819f175870aab18a0fba06af17e525709c4c34", "format": 1 }, { @@ -974,13 +995,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "4fd514bda9fe8a19b8e92ee364d74788356da804d3dc2bbb234d3be37421b35a", - "format": 1 - }, - { "name": "plugins/action/licensing_eval_license_info.py", "ftype": "file", "chksum_type": "sha256", @@ -1040,7 +1054,7 @@ "name": "plugins/action/personas_check_standalone.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a8a65a72d973621c0dd0881672113f53a06172b6a2ccd6e5b731c2855f682937", + "chksum_sha256": "e7ac40aebabdc8ad0861b2fd777eb42d02d46f86d2bcc6c11555c430c638a3c5", "format": 1 }, { @@ -1121,20 +1135,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_vlan_mapping.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "881d66b2f9e666ac130486e654647b412749e0a04960057269b3244031430202", - "format": 1 - }, - { - "name": "plugins/action/trustsec_vn_vlan_mapping_bulk_create.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "63e23761602fc311195dbc00a9611fee982e01718bb2e8c0ef4c1259059f19b5", - "format": 1 - }, - { "name": "plugins/action/sponsor_group_info.py", "ftype": "file", "chksum_type": "sha256", @@ -1166,7 +1166,7 @@ "name": "plugins/action/device_administration_global_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fabdcd5cbb34bca328d4b85b68f0e15db0fbd6b2e30e5c215a407d4e86a5f031", + "chksum_sha256": "71f7f337b4f2e125fcadcb5edb8ba618a8e121ccf35abd7e8813cda903073205", "format": 1 }, { @@ -1201,14 +1201,7 @@ "name": "plugins/action/personas_register_node.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df41fe7f6b39fc73de8854b4533785c1f173b2924b2593b0ad79679867a7e131", - "format": 1 - }, - { - "name": "plugins/action/trustsec_vn.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0054abbeaabc0253444fb7a75b79fa0b4213da9756b12d288e2f6e87a82203f5", + "chksum_sha256": "08ebf1dcb40cadfe6b938a7622443bca291a46a5b3bbc7e2c8be1566dc63a0e7", "format": 1 }, { @@ -1243,7 +1236,7 @@ "name": "plugins/action/personas_promote_primary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f9b7c99882b15717c52bf1421f771a482fee6ab7ea4ea1699169b7771b26a759", + "chksum_sha256": "281be6dd4a9d2ef171ad7451f32e782b6a9682588244a5fd9c870ad15d3f2b80", "format": 1 }, { @@ -1278,7 +1271,7 @@ "name": "plugins/action/node_standalone_to_primary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c95d4f90f04279b4c6930732ca9a17c1ad0c9f9eee2e8bdd84a866a0b5db9499", + "chksum_sha256": "883c2bea469a9a8ee73608d94aa033e31e154704347caac07130b04b9483dd7d", "format": 1 }, { @@ -1334,7 +1327,7 @@ "name": "plugins/action/device_administration_authorization_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d641d6bc65ebf4e91fe2d614ff95355d71d20fdedc333d1d2f4e68929d5caac3", + "chksum_sha256": "e83b48036a3a794e48993214700fb9ec5946ead5e127b523a403d13cffa8093d", "format": 1 }, { @@ -1355,7 +1348,7 @@ "name": "plugins/action/network_access_local_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7c2ade73bd6d2effbcb1985ba100786c23f9b0b8109b5297b874f15f08ccd50c", + "chksum_sha256": "21c2f6057be6e3e1da5195f37d7fc15898ad043baf50893163c58d406c2bf617", "format": 1 }, { @@ -1383,7 +1376,7 @@ "name": "plugins/action/device_administration_network_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b5b2f971484a77560e0b9a544646d20413f76932da8e3e77e66c7fca88921354", + "chksum_sha256": "7be2ed7ba81700afed9ebd90249dec20fb76324623b6fa695a619e8c92283995", "format": 1 }, { @@ -1558,7 +1551,7 @@ "name": "plugins/action/endpoint.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2e88f00a40e7df63a6fd15f88f23c7fc3f13e5f5dd2b4380f0d399e840b1a9ae", + "chksum_sha256": "671c3a0bc9391b9e07fa36e0246643c6274cac6c46ff5ffdc5947ffbcff717dd", "format": 1 }, { @@ -1576,13 +1569,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_bulk_create.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "88919feae044ade3c6a6d25c729c0f883f49d52f9b61bd3286709f495cbc6a64", - "format": 1 - }, - { "name": "plugins/action/node_group_node_create.py", "ftype": "file", "chksum_type": "sha256", @@ -1709,6 +1695,13 @@ "format": 1 }, { + "name": "plugins/action/dataconnect_settings_password_expiry.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1a322b5dda55d9f723529862f74efc35aa7a949f84a301827f3e6da8ffe6c441", + "format": 1 + }, + { "name": "plugins/action/pxgrid_node_approve.py", "ftype": "file", "chksum_type": "sha256", @@ -1723,6 +1716,13 @@ "format": 1 }, { + "name": "plugins/action/connector_config_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a890d6dd2cebcc4802fa8043011b320f5fb58f79116f8899e53377455ae3f6dd", + "format": 1 + }, + { "name": "plugins/action/guest_user_reset_password.py", "ftype": "file", "chksum_type": "sha256", @@ -1740,7 +1740,7 @@ "name": "plugins/action/mnt_session_active_count_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c25a59bdca8063495549d9c8a619a04e9d9f1fbcb13a208aed4d826a5c01f8e6", + "chksum_sha256": "05e60cf3485bf22b50bf7ff003b58ed1d5029e103287a9498265df643c298b40", "format": 1 }, { @@ -1852,7 +1852,7 @@ "name": "plugins/action/node_secondary_to_primary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "229780ac85397dac346beced1ab4c433ac2acc139817d77f15230c84bd738951", + "chksum_sha256": "7e68dae78a3ed0b0729f98ba9ac28d25facdd22189962304638a31e954f89bfc", "format": 1 }, { @@ -1863,13 +1863,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_nbar_app.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "4740fca59d6dd94575754804fce18a2db249eaae7abc2f8116cd728fe2617af2", - "format": 1 - }, - { "name": "plugins/action/sgt_info.py", "ftype": "file", "chksum_type": "sha256", @@ -1905,17 +1898,10 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "546e383e2f7aab61515bb03753478b689c4459ae3c14bb2d468dbe2ac4ba1dcf", - "format": 1 - }, - { "name": "plugins/action/filter_policy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4fad28d38671562de7cd1ab39e2a12294c1d462fa1a6b3fcec3dee7fa22278e9", + "chksum_sha256": "5c47d833c364e1f85e82f6cbdd1eb224350ddd17aca726d1e74e3a0dc28c6472", "format": 1 }, { @@ -2031,24 +2017,24 @@ "format": 1 }, { - "name": "plugins/action/patch_install.py", + "name": "plugins/action/subscriber_bulk.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "91b63e82314d36684ebeaecc578dd96600c5fe4d9001f5eeb3223adee009bac3", + "chksum_sha256": "16fdf4fcf23dca3250a9b0a973f321fe69e632771f090d7cae9712c681a93160", "format": 1 }, { - "name": "plugins/action/network_device_group.py", + "name": "plugins/action/patch_install.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "682f4caead156742b8e3674a4f28dc806013e56d0681d47bcf80c8a167ac0fa7", + "chksum_sha256": "91b63e82314d36684ebeaecc578dd96600c5fe4d9001f5eeb3223adee009bac3", "format": 1 }, { - "name": "plugins/action/trustsec_vn_bulk_delete.py", + "name": "plugins/action/network_device_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc83b1dfef409e740fdfd9e4b77dab6ea1db37ee04d73cd9acea16ea7983c6df", + "chksum_sha256": "e63101cc9853cd30514eb6f877f4fe736c6a6a926d644094dcedb8c420a5dc39", "format": 1 }, { @@ -2073,13 +2059,6 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_bulk_update.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2eb856aad4e996b4ab1c50b16377f5482546a45f1005db62e19d413a1a4fd04a", - "format": 1 - }, - { "name": "plugins/action/support_bundle_status_info.py", "ftype": "file", "chksum_type": "sha256", @@ -2206,6 +2185,13 @@ "format": 1 }, { + "name": "plugins/action/connector_config.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "64b85d5d97fe9b46c1c0a76c0de783665ff809ca6f878daca6fcabe25cb60038", + "format": 1 + }, + { "name": "plugins/action/endpoint_group.py", "ftype": "file", "chksum_type": "sha256", @@ -2216,7 +2202,7 @@ "name": "plugins/action/network_access_authorization_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "16781fb9826fb58c72767409f4cda9112291bab0e2a0f739ed7dee4577757dc3", + "chksum_sha256": "cb6f488bd1b5a36cdd2969afd03c99e9c75fe6b212609c4da88a028d3026001b", "format": 1 }, { @@ -2227,10 +2213,17 @@ "format": 1 }, { + "name": "plugins/action/dataconnect_settings_status.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "af13187b10320c878946b8b6d35dfa2e75d90a99b1c1bd3b58e711b13aa0e303", + "format": 1 + }, + { "name": "plugins/action/device_administration_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4ca08c5e0210015b40b8c20406ad28cd7197a43c44116daee0e096199a2e14bc", + "chksum_sha256": "63b7a36946e865ba2f780cd0b480f365ebf84f28b06aed8ac49e17023c2cccb1", "format": 1 }, { @@ -2524,7 +2517,7 @@ "name": "plugins/action/active_directory_groups_by_domain_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1bcaf27db666ccd80e79b12a6c9c247d2d0fee6832dd8de501e7764ccbd15ac5", + "chksum_sha256": "cab601e9a87b6be84a397f18c1f4b205bbbb42af2518551594f7f665dbae5025", "format": 1 }, { @@ -2675,17 +2668,17 @@ "format": 1 }, { - "name": "plugins/action/trustsec_vn_vlan_mapping_info.py", + "name": "plugins/action/external_radius_server.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a41f84910e2c277846977ff9a72f6bef7266bf39606e9d2ea5c192e23172e63", + "chksum_sha256": "4d6e3bb3023b33797f53367f96ebc7ae5c99659bc6d50546ee2a8714778cf951", "format": 1 }, { - "name": "plugins/action/external_radius_server.py", + "name": "plugins/action/dataconnect_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4d6e3bb3023b33797f53367f96ebc7ae5c99659bc6d50546ee2a8714778cf951", + "chksum_sha256": "13ed05d46bc6d8a554c4118e01188caac059f872da15d5661564847413402e76", "format": 1 }, { @@ -2769,7 +2762,7 @@ "name": "plugins/plugin_utils/ise.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c0e405eeb0a613d0257478f01603205b4c42bc113c93d8088694559ad9a544c6", + "chksum_sha256": "75af06fa992137e1506d5daba3fe7da1eda9c590fb4190294af256782ee78a60", "format": 1 }, { @@ -2783,7 +2776,7 @@ "name": "plugins/plugin_utils/personas_utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd19138b6807f973e873decdc94446228cd8e49651319c300711abb9612ab54d", + "chksum_sha256": "92167abd40765c98163084345b5818bdb044a6c7e76eba8dc245aa180f6f71ac", "format": 1 }, { @@ -2797,189 +2790,196 @@ "name": "plugins/modules/device_administration_local_exception_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd93a450ed4c82219197d89207f2132e8e77a0a52ddf5de7b0e06cac030b48e1", + "chksum_sha256": "09ae30cafdfdaedff939f4b2c930cb542fd43b4561624277d409aae46157f7a7", "format": 1 }, { "name": "plugins/modules/device_administration_dictionary_attributes_authentication_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4f8a541b5e5d37ba6844d899a47c379839e02bd504e46b6b7bbeb94df169d1e1", + "chksum_sha256": "8476e48894a7656205fc78df7eac32ab88ea67689b3f93062dc5b23c018e0461", "format": 1 }, { "name": "plugins/modules/licensing_tier_state_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bfffb406833cdb990b7affdd5caac902255fffa6b5a691bf493b5bc8b7126b40", + "chksum_sha256": "63fb977d105ee74a82916f0ba2298cab112a91c126b43ec2f6eac8031c20bbd5", "format": 1 }, { "name": "plugins/modules/trusted_certificate_export_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4c833ab8c0fcf68d4c63a3c610bebbea6729c475a7acd9c023a02f104dda48a1", + "chksum_sha256": "7005a773193d4c2af2306f641b10c106f205a563ef5903cce77353726b7bc080", + "format": 1 + }, + { + "name": "plugins/modules/test_connector.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f8765f75d2dc3d2e7b12bdbcca138d78e63c90b4d47ddcdd969eccbded3bb6b6", "format": 1 }, { "name": "plugins/modules/network_device_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c08356fb8ca42672775f2ec7321ccb2e5ef5c7d5933aa501c917f698f756aa29", + "chksum_sha256": "f2fe4359fc0c23d30519fb22b73700330ca25377e18153339c591d3cc17bca54", "format": 1 }, { "name": "plugins/modules/sxp_connections.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "91b635df49ece1ccb9025ede6e2ca8d01b2c0f4d80724c6a72bbcbfe2e755b2c", + "chksum_sha256": "7a3c087ea9a964262bc9c18b16b592536c2ac56a76ce8c20b48a7157ef166cac", "format": 1 }, { "name": "plugins/modules/guest_ssid.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d14cc33cbe8ef579fe6b0a30d4bb6ab25e6c5e0998edfb985a86b9764dee75ec", + "chksum_sha256": "dede565f2ffb62d09f9bfecc241cf110f74ea4cfb5d36fc89059dc9c9b66653a", "format": 1 }, { "name": "plugins/modules/proxy_connection_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "827ca614c3ea7998776b3ea2d41e964283fa78a30b55a7c313b57553ff5bda75", + "chksum_sha256": "1cbb52e38a4f8e52c5fe3f7cd05370657404d99ee22c4f662fafaa68797251d5", "format": 1 }, { "name": "plugins/modules/node_services_profiler_probe_config.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b2470934fb64265903b9da572adcdbce3bc23631f94e4bb9d1123ea80b66ca17", + "chksum_sha256": "d2f4e2aaef44e1310805589382a1ea7f3c6d93ee2c0b6ed322428fb520455257", "format": 1 }, { "name": "plugins/modules/network_access_dictionary_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31a8471b2d054bb0e0c95458979d4274454ce4d6aea28334d2929b53448b935f", + "chksum_sha256": "d69bb851277d9e75a8b93c8ce1dd8c578e6118526abe491a8c6f22c898a764c1", "format": 1 }, { "name": "plugins/modules/network_access_policy_set.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "07133d0d907844424ac2424c8f267ed766a21d3e9914424377f24f52d12166a2", + "chksum_sha256": "5713ef3d393066e493d3c87cc9a719c7d16551a1b835b341ea811f977f7c1888", "format": 1 }, { "name": "plugins/modules/repository_files_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc0c93832ee5281983e9c2ac33526c4ef4a09c3ff8c1f3ad111dc64a9bc5f776", + "chksum_sha256": "081546c6c87db20ca51c38d82b012ba8b1bd5070cf652e0d69e9f5a2ab078a2a", "format": 1 }, { "name": "plugins/modules/repository_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9f83ea969e2bc7588774f2f105702178a805cdf042f238eeea04d8f77d6f6561", + "chksum_sha256": "1703f4d06378c7020d3f94421a47556b13dbd7cea9941f7f679b81c8d1e83fb9", "format": 1 }, { "name": "plugins/modules/rest_id_store_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "589aff070e5ff8a48fa825007336a334e90e8dcc34fc347536b20acb93f5b427", + "chksum_sha256": "14b572f096432cf70b51d5baaf706e6d0ba28d86820ea8703dfe5132862561ea", + "format": 1 + }, + { + "name": "plugins/modules/dictionary_references_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "be0b8b39394faa8fcec5576e32b80f640b9226d8f7e07a9c010edd60df55a206", "format": 1 }, { "name": "plugins/modules/anc_policy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "12c43a6a8e272132ae3ad78e0d3ab6e61329183cf702baf86d4bb338d2614439", + "chksum_sha256": "294257a71721b5d974d429af6b3ddff783885fcca6330621af88d5db6fb37d33", "format": 1 }, { "name": "plugins/modules/tasks_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "01df1458233357384e707d8ec7fead62aedd5f29e0b112b7e54e476f8acb419e", + "chksum_sha256": "9867e0e226170cae411c75ec11449a512ec0bb13a344affdf4759217f3e2b1ed", "format": 1 }, { - "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py", + "name": "plugins/modules/configuration.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "57713f5a8bbf4f91ead662e29a14616593e05bb92e5f0f07aab0dea77f816ac5", + "chksum_sha256": "716c2d97dfa29982d894ed7b6eed49df77788bf629c12ad17d54b4bd91d2dd9e", "format": 1 }, { "name": "plugins/modules/device_administration_authorization_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "94101b0bb67ef72bd66a20219c98990a35c9405630f6a12354a95d02612a1fd7", + "chksum_sha256": "739ecce2426b8e3de909cfc839fd96205bee964536e62f493becded908ca8eb9", "format": 1 }, { "name": "plugins/modules/guest_user_email.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fb0593d16d9dc392c4844ab4ca74f58b10620e7bd3f2080f080ebacc8b63f0c6", + "chksum_sha256": "d7d89a26275bc421969561f4dad11a78b569337f49dce8582fcc3eaf213dff98", "format": 1 }, { "name": "plugins/modules/node_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "50086a9fba86b29a502087a937630c2c065612b6b2b9af57eb5f2ff988c57c0b", + "chksum_sha256": "6999a49500155c2bb7f46c35c615249636e24b590b584fe9a2a1e0eff1826d44", "format": 1 }, { "name": "plugins/modules/mnt_authentication_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc7d58ec6a7e14b3f2226f47017150aa07f0e62b22602e860d9822a596d03e1b", + "chksum_sha256": "7f0681c527c0536669cdfe189906f1a0d50b956ed7d2c62d5ab09a5bd1d164eb", "format": 1 }, { "name": "plugins/modules/pxgrid_healths_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8459e8f9eaf4267edcaa471b84f75efb5088cbee5845fb4eb4492469967327d0", + "chksum_sha256": "5ccba2e9d5158dfea68ed16f7a88d20ee607adb1230f571d405aef297ec72331", "format": 1 }, { "name": "plugins/modules/hotspot_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "70f186956cdd198610940bcb993fdfda0c03880e4d8af5db2d6efbc50ac1b43f", + "chksum_sha256": "3faf22154e3697a6747b9a125c97715d01acc6ec9f68075b41dac7ac3e2f411e", "format": 1 }, { "name": "plugins/modules/authorization_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b0210a68b996a7b751ca7999878855a017d74f0f7736107a4c1fd53939a41258", + "chksum_sha256": "9313dad0b5059a1248e29e1f6e7c8e85c1295fc1b078a7770380c24fce5c7a88", "format": 1 }, { "name": "plugins/modules/hotpatch_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a72be29edaeecbc7e09221722c394515b2d262f7eb2727e56cfe1fc4a5ae52dd", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_update.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b059b7fc449b96efb38c563c90109c4865ae174bd375aea27e32bd8e86aa1b19", + "chksum_sha256": "0e2c05a9c3a3d0202f0cd9b6b5388815a7021c6caed8bf7237ef7569bd93b03d", "format": 1 }, { "name": "plugins/modules/node_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "51ae4964b15cb06c554915625a86fcb299aa5b624f3aa434f11e165216ffe393", + "chksum_sha256": "882b934437c291fb9fad34742acf7dc90fc37d4b3eb026dfb42f30b1457acf50", "format": 1 }, { @@ -2993,679 +2993,686 @@ "name": "plugins/modules/network_access_dictionary_attributes_authentication_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "556c8bba1442f43abbf15923a0aa4b17fce3d79fab47f0e0d9446f6a986e03ab", + "chksum_sha256": "d6c304ee66b0e51c1a3cb95d4a387df3347fc8d34c22b28a8d065a9d79db8674", "format": 1 }, { "name": "plugins/modules/aci_bindings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5bb2e4b3a3a3de54adbef35dd70bb24bb920c601e891545bd26a4acab9fc9228", + "chksum_sha256": "d00714589a5f15f66f45f8f448144376d3ee8b7fe585909ac7ab35c3ecf49f5d", "format": 1 }, { "name": "plugins/modules/network_access_policy_set_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b4c2e4b214cca276256b002f3caca84d9368d9e9609e2b6bf92231c6edeee20b", + "chksum_sha256": "8bbef6ddcd1b4622b2a97d7c18e1b0b1f9f9a8e160fbb3a4c5dfde4688b6dfbe", + "format": 1 + }, + { + "name": "plugins/modules/subscriber_imsi_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b2ce392430ce97f2daa5d4246e2ea99d9f32b6eef1a962bb8a448f4cd021cc8d", "format": 1 }, { "name": "plugins/modules/id_store_sequence_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "458ad7b7a5bb52d71c0ea96d6465906e21d9156048bc1f7967353a6e7a0605fa", + "chksum_sha256": "f493269344feb6a4033def5c0e6d0c3c4d440463b9c19f8ae7a79fb8bcdd7cc9", "format": 1 }, { "name": "plugins/modules/device_administration_policy_set_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7d89a2d4b3539a0bbcbf8a3d45da976531c2a77636a62e79d54e469203e8978e", + "chksum_sha256": "b82251d9ce28fdee92a44b24606c72313b90ecd377fbb823d528d6fe3bea1a91", "format": 1 }, { "name": "plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "376b5bbf25dd32d0a60a187f72d7543fbc5a9a02b8cb08f2f8abca804cd3059c", + "chksum_sha256": "35d00be52dbc47268c254ab700bf84d859dc92df667f1b07c62ef68fbb6d4c98", "format": 1 }, { "name": "plugins/modules/ise_root_ca_regenerate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ff8968901018a0fa903611b159ec530aa3e495d8eb865e3ae4f5eaa8b3234bc5", + "chksum_sha256": "29bd7c7145a9160a485b567a58e97d06b0522f5f610c1efe2cfa9c4243b7bd69", "format": 1 }, { "name": "plugins/modules/mnt_sessions_by_session_id_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "913f9da62a824026a38772bb33734ba787d020521d1193701033e5a7fd71cf99", + "chksum_sha256": "2babc37c2aecaca3cea9206bd2f41f0495b3909a4e0a4ab631abd16766499212", "format": 1 }, { "name": "plugins/modules/network_access_service_name_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dd6ef73d8d5d0d18f8e008f10329937f814e7f98f6f68c43c16843b101c1bf87", + "chksum_sha256": "1b03b476ef2df82c065af8343f272c6b7d88d6853686afea82102e701f707a28", + "format": 1 + }, + { + "name": "plugins/modules/configuration_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e29f02240b3d31ed366388e4cc75fc8da676e639a5cc925c342099a4b785a91e", "format": 1 }, { "name": "plugins/modules/guest_user_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1a2320f2950d194fc1150496ad5890374548a3ef969e142d8ddcd0b95e2d4f25", + "chksum_sha256": "69c182eddf6fa234727d6ed1e37ce07746e7fae7c88c4a29c4f39895ca39ad2e", "format": 1 }, { "name": "plugins/modules/aci_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4c100ebc7bc35d13ee60f2803f9435293c1f51c1a6d9418983b3a967fb4b44bd", + "chksum_sha256": "2586669093619adb07848595b89811aa8954a4cb8c052cde2a31e2c840b9dad3", "format": 1 }, { "name": "plugins/modules/bind_signed_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e747c8033549c22e58bc4cdaf83504de923751cf49fc6cd78a14602e2166217a", + "chksum_sha256": "2e29bbdf7db56a3801a7bc49509dd30c59a99d31d19c3ed34868258d29f63ecf", "format": 1 }, { "name": "plugins/modules/endpoint_register.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2463eca19297eec5d502a218d9beb81f490841c1a749b0c753788825f3688fa6", + "chksum_sha256": "9f49a5222503a73a905aa489517c5d5c2c4d42c8fcefbb41418731eaed3cd6ac", "format": 1 }, { "name": "plugins/modules/px_grid_node_delete.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e38208e1c96c0ae847fae729f993653488edb0ea464590b4d7782ec9cfdef100", + "chksum_sha256": "2a784dc14d4e256ae046acae41a8aac1e00e3a35365eb7f3358137695cb4a717", "format": 1 }, { "name": "plugins/modules/device_administration_network_conditions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1039d4575c88bdd8200b91852593ec2e153e7836fcc895c31e28eca803056623", + "chksum_sha256": "39d47ee06a7c2bb9464fb4ce8c3c509010ec682b82fd5d7b8fe172a0dae90802", "format": 1 }, { "name": "plugins/modules/node_primary_to_standalone.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ebaa4955ed9ce00b28ec896ef222a2cceb27b4017a5a76df3523b488e2daf084", + "chksum_sha256": "9aeee0804d23f71e8228af812a2ba0be44719e1d81c6324fb88805a4be56f540", "format": 1 }, { "name": "plugins/modules/active_directory_leave_domain_with_all_nodes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cdf07f79c47d797f867c7c30a10266b0851861148d71877d604daa52ad7fc9e0", + "chksum_sha256": "748402df727ade75ccb80cd8dc5184c585428649b88a6bdac12f5a1910c115f5", "format": 1 }, { "name": "plugins/modules/trusted_certificate_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f2e7031163dc3bd54c848b95e752240df2f106004e9c1680b426e9bcd4db5a5f", + "chksum_sha256": "7866b5a7c01dfacb8500b37a6c9fefabac57fe53e1cca6c4c5269320371b33d2", "format": 1 }, { "name": "plugins/modules/licensing_connection_type_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bb2042bdc2857f1afd688418d7928bf0663184bb052c4662eb2d2ef04870d5bb", + "chksum_sha256": "bdcd9d2705e8a2100da6cb81ff01e381f000ff3eb60273e7970d656ae0170861", "format": 1 }, { "name": "plugins/modules/mnt_account_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2b3f7008587617cefddd9f95e59c95f09b04aca25f7248d5decfaf64c4d66f89", + "chksum_sha256": "c4fc3f6fccf8aa815b68914c5fa073ade60fc06c84586aae609557e5620905a6", "format": 1 }, { - "name": "plugins/modules/trustsec_sg_vn_mapping_bulk_create.py", + "name": "plugins/modules/node_deployment_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "37692774bc29df34cc5283f763564329e5f71d82bb3d8157eed3544387f63f89", + "chksum_sha256": "166ab9970563ba3d6d8de08f901e34d08dd445d242ea31b4c518d9f135610b79", "format": 1 }, { - "name": "plugins/modules/node_deployment_info.py", + "name": "plugins/modules/subscriber_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2ea492310812029c67d5356e5ca9ffb3a79c76642f3175d26f875bd6a30ea631", + "chksum_sha256": "92c9e14e1f6a087757a766e596ed0e5cb6a94189257fb7e9d0c216d3dc096ce9", "format": 1 }, { "name": "plugins/modules/pxgrid_failures_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "483afc6402c46fc33996a910b4b7805f46fdf4066942a15e470d50c1cc8a7829", + "chksum_sha256": "ec85b40aede2c5c985ff8f3b5795d207112c65c6c6675fdf9f9143c7e0211988", "format": 1 }, { "name": "plugins/modules/network_access_global_exception_rules_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9eabb08195779085b7a42eb272539e8510e4161a8a0afceeafae24e1d4602b71", + "chksum_sha256": "d6596b2bc770e1e393410b9d91a510e529a71caef529e88d0ca102e244c98b5a", "format": 1 }, { "name": "plugins/modules/device_administration_conditions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a5913d58cda6ab4c401a57d4270d4cedfdce6712304a1bd3296fa276625d9954", + "chksum_sha256": "92c92206e422eb46973b3b0d0d1b6a1994732b6a4f305e91d1d0843435242c59", "format": 1 }, { "name": "plugins/modules/pxgrid_security_group_acls_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "438634f030988f75af1421d4800117af0754906cfb541291f37ebe934d6981eb", + "chksum_sha256": "c5e496a8ed7524abbfa731d8cbb265303e5bd353e64b6d546eb024691400a827", "format": 1 }, { "name": "plugins/modules/guest_user_deny.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5be796345445bca15c3d5de041eb41bfc40051c2a83cdbddae42bc15bc7a07e3", + "chksum_sha256": "ccc7be67ebbae53ee7a9cec8e343351ebf128407dda3c44c793d55dbe3ccd8c6", "format": 1 }, { "name": "plugins/modules/admin_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0739bfdfc85cb2b8e57d86ee1bebcb843d2e7d44833b62dc326595b97f32ed20", + "chksum_sha256": "6ae8b4f80470b4fbb690374441da5eb486a6df30f1d805df753b62ee8131fbdb", "format": 1 }, { "name": "plugins/modules/endpoint_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "779bea3e84c3bdd276578bcb21bf2008cc5bb7e8d9b7272320a2a6a3d82a50b9", + "chksum_sha256": "7234182a4d90dfcc8d61e69cee62087dd92fa001e0dea6e222da1aad0515d065", "format": 1 }, { "name": "plugins/modules/threat_vulnerabilities_clear.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1b78c6e0637da65461d53a162ac679f48e494639315e498aa0106f60a2ea88b", + "chksum_sha256": "b5a65e21240cbdef08c72c22f3fc38024fdf2872157bafb8c9d052d4cd9723e2", "format": 1 }, { "name": "plugins/modules/identity_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7ca16a1ed5af1052f783c719afdec52f1358e5b66afb7eda81a87edf6183486b", + "chksum_sha256": "a7c579389a51f5895c6834b9bc58a1a6078a63c8f56838e40eaec496788c00de", "format": 1 }, { "name": "plugins/modules/network_access_dictionary_attribute_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87cee119651b150dcc94995c638e9a21d2f9c885a906bea85bc65cde55bfa1ab", + "chksum_sha256": "f70a53a10f74a5f5c4018edbdaf4ddd5cecad5afa3d9912badbbe38f607d5bae", "format": 1 }, { "name": "plugins/modules/sxp_vpns_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28fddaf0fe9e77b723ac658aad6a753ca75bbbe64bc7a1b6956273b1915212ce", + "chksum_sha256": "8f365397225b9fbe923f97d2e7fdf2424d880079c1c39e7432b79fbaef99a315", "format": 1 }, { "name": "plugins/modules/network_access_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4ccbf33367d65985ca8cd1c3ccaefd64bb31832d0091e5648b14eec384127334", + "chksum_sha256": "9c71c394baee493813c269df1b56c4c7266cb66f8e9e01765c088ca17af0dc0a", "format": 1 }, { "name": "plugins/modules/certificate_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d28a1d181510c4204aa7a74fa469692e6736dd08e6b2ff1be0838e57c9b9d7fc", + "chksum_sha256": "1a60ddf2d4e06b73c26a3fd67fcc0ea49f5a1a7204d31dcaf11d7a84b1b5dc32", "format": 1 }, { "name": "plugins/modules/pxgrid_settings_auto_approve.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd3ffc502482f3bf375cea9c621f2e975855ff3da1d7e349af1b17fe5e54b525", + "chksum_sha256": "c71ffca5fee2bf40c945757640205103b8a8dc10244255639f32980d363c996a", "format": 1 }, { "name": "plugins/modules/guest_location_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "56308ecacf00177f3906a2c601bb78eb3512ddda46ee7c59a50c522e371d2c0e", + "chksum_sha256": "7524ac95d885e8cd03250c3559cf2d7e27f680de671e8735eb8ce273e8f65bd6", "format": 1 }, { "name": "plugins/modules/native_supplicant_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7ba584fd541b648080867daeb491ae0348cb999521d6face6f29d6838d9cfe21", + "chksum_sha256": "c105f24de5e238f0d2d6e67d977fb7aea951d4d846100f071b07045c08a9a15e", "format": 1 }, { "name": "plugins/modules/device_administration_dictionary_attributes_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "194abcbc38160d3105ce399f031ef324abbe277bb89118142e3f87eaae2bada9", + "chksum_sha256": "08d859de5c2944ba7ccabf2605e0d1cc7bc560fa3f0bba947593c8a9bebce930", "format": 1 }, { "name": "plugins/modules/network_access_conditions_for_authentication_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "60e25c378a846db0e5145b21b479d0a3a9210e223e97dd4a25dd22dea5b8731e", + "chksum_sha256": "990e98e15ed154a9a30a89853ea49931719f6d53ea6c8c67194a94ee81fc52a9", "format": 1 }, { "name": "plugins/modules/mnt_version_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8853a605abb1e8fac87bf04b08162109892fea5b6435641206b670bc741378cd", + "chksum_sha256": "c673c5c9cc1e42b94130c122a68dc8537483da2cd9d497f0e5aa18c667d03059", "format": 1 }, { "name": "plugins/modules/sponsor_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "256912dc4f06d2d2de0ea1c8825b9d64abeaa28e6fd5fd890603be3c2463e8ad", + "chksum_sha256": "440830d53446c8e995da69cbe9b1321ee5fe90a3fbb56800020dfecf5a792f64", "format": 1 }, { "name": "plugins/modules/device_administration_local_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fa4f5517199c01813db4689ba5352cba4b3754f95381c12c87054ee6a3d9f63f", + "chksum_sha256": "49552d90f4c02e903bdf3d927bb4a14ea72cecea862ea4d391d666aca92c5122", "format": 1 }, { "name": "plugins/modules/system_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "09346329a322219835d44aa88098f3ab53d4d2277331a660d393df536327ba96", + "chksum_sha256": "13d091928dc59c166119864b976ab912927180878d62b21113269b6fc8e2921e", "format": 1 }, { "name": "plugins/modules/pxgrid_bindings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "71a092f54e16d1d216d460bf7b0bbe1a227a78c34146a9020582a0952dd82fc7", + "chksum_sha256": "a44b764670fd210b48bca6484acd60bc1ba75962bd9a863001199aab9ac2d879", "format": 1 }, { "name": "plugins/modules/tacacs_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "86cbde22b6470f0df1a41607be0b4dda194a16658e525f1d5eaeba1a8d06540b", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_nbar_app_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1fc537a4c714b51719caedbcca158512465af3b8fdd3c39841fd15c4759cf5f4", + "chksum_sha256": "24632d1746e614d367f8830fb90e54e811f170bbe72f142846e2353acec6d138", "format": 1 }, { "name": "plugins/modules/tacacs_server_sequence.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6ba70260e422c7e0983b636a9c780696a93e2517111acba3c546f98c5792df8d", + "chksum_sha256": "5cf7cec337806216ce8d2095ac7bde8ef3efba1ff1b449a0076d305f63cab5e5", "format": 1 }, { "name": "plugins/modules/network_access_global_exception_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e47917a594471c7c6b88b62bf6b3017862c77bfbc561714544da11c213b3ba54", + "chksum_sha256": "da1584ca3b1a9fd0308554c2726cea2d838cbc3ae42289de3657227c6033ca5e", "format": 1 }, { "name": "plugins/modules/mnt_session_profiler_count_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "07650b64d85aa5be715c6e74ea31ce2f9d60e67a65e9b91ae4605a8c1cc44ae3", + "chksum_sha256": "a981bc86da64317d0fb2e5e92d9e8c0390469061923274cdc6359975c707b3fe", "format": 1 }, { "name": "plugins/modules/external_radius_server_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fa2e4ad5fc661f64b0613e567e874dade59d3bb5b76ea30bbf9e22fd3e68c72b", + "chksum_sha256": "814af5eea5adedaf71567040fe7b0868aa1148430395c8cb73efd3d89bc21e2a", "format": 1 }, { "name": "plugins/modules/session_service_node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1d93805c8a2a797fe52631e40782a0cd291d69c233721d4696bd22c5f5a4b648", + "chksum_sha256": "285305471b4e4b424bf55002cb53b29582264c933c9eeae0a683823e81732c67", "format": 1 }, { "name": "plugins/modules/network_access_global_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4d0bc057cc50987a981d7c8d8511ad9905934cd0d50d26e6af4e5eedf679d5d9", + "chksum_sha256": "8b8ec79d4392452c1091d30cfa2d5a58866a38b876094aa4923f12c7bc801b88", "format": 1 }, { "name": "plugins/modules/sxp_local_bindings_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1f1fc26c823085aa5b22000e5de2f18d2f4abbd0d29b5ed7a0fe11323fe8f227", + "chksum_sha256": "bf6e0e53c061a0c1808d77e85e0eefe546b5524fd5b62d2b7e670e13140f217d", "format": 1 }, { "name": "plugins/modules/pxgrid_performances_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0ca45d9f02175c5f1755404d8da9067437dc798eacc54b28a2449e8ad84b6467", + "chksum_sha256": "efeeb776fe85cea5921d284fd296181f0ed12a607b5fc3f6fbe7ea6a40a348e7", "format": 1 }, { "name": "plugins/modules/csr_generate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1e259d3c220828286972baec0335420570bd0f0db22a5245161af5b3f63562a3", + "chksum_sha256": "119d441b532c45269469923f9bceb3fdadc23c8ea96b126ec40cb0663ee282fe", + "format": 1 + }, + { + "name": "plugins/modules/dataconnect_settings_password.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "de0cee6f0f7dafbf1064c2a527765ce3c6ca9238d096763b08bfac161d45d79b", "format": 1 }, { "name": "plugins/modules/pan_ha_update.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6c3bc9315f4e24c04b4d25a47f569f198ece4a544d880554d9a1b5142f0728e2", + "chksum_sha256": "7704e611ac6a19e9ff118adeec6d3a1eb46c3d1e8dd4597b87190c8215a73a3e", "format": 1 }, { "name": "plugins/modules/mnt_session_by_username_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bac35d8da50b380b9c38c876cd755e4b49aa7825fe1f36d326d0fb5f5393315e", + "chksum_sha256": "cbab19d5b0c29f5ef2b89a86ee72ba8b2992ef1ecfba05a79a4eb5a0df197cba", "format": 1 }, { "name": "plugins/modules/network_access_time_date_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "05ee39da892ef246a61132a96c9c25925aea434beea86ab179dea97b5529e35a", + "chksum_sha256": "512c68e0c3177570b77d3ec64c88ed2f317d36b1e628ab5de3ac474c2097b660", "format": 1 }, { "name": "plugins/modules/device_administration_time_date_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dba84210c28dd6e953edc706be580164a3037118cb85472b3aaa891338340f66", + "chksum_sha256": "cef7f7b1bb08dfbcfafd73b3503eed875821ba10e5bfa7b10cbc9bd162e3b89d", "format": 1 }, { "name": "plugins/modules/byod_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ae42e1aa097b8f8a4493d36fd2dc3765371d213b3a9696f43290ff90fca16660", + "chksum_sha256": "4da7335799d04544ba7edc2a85772d5b098293ae6c7c88cfe43a6bb25a299ac5", "format": 1 }, { "name": "plugins/modules/node_services_interfaces_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a2263c7bfb1c81e045841b59c8be3ff074494600565386d0d22d261a9f1b387a", + "chksum_sha256": "178d0c64a801a7692df4bcae630a603bb9c4099c27ba763247d6f15c4e56b275", "format": 1 }, { "name": "plugins/modules/pxgrid_endpoints_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "663371e87b3b340bdb1c36511247da9bfbc0d7dbe41583aade88b8f6d865db1d", + "chksum_sha256": "72465579a8aeeeb2744940cf3d0c35a1b4960639d4cf2f1b44c4b1eac62e219e", "format": 1 }, { "name": "plugins/modules/portal_theme_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e6697828bbe45c603cf7931e30400743c37f47d48e625e01c4b5deb1217ed954", + "chksum_sha256": "8bcfbe78101b725e2e239015a34293ae387d65c87df63fd2dc2569c15b827077", "format": 1 }, { "name": "plugins/modules/guest_user_approve.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5a8cd93e088da9bffa035e977b3ccb60deba4d4a2fdfe22eaef28182ea0c4d72", + "chksum_sha256": "b3fae6c1c1d24e9c807f5a78354f84c35e75f4897a7d1fb3dc1a217dbde532ec", "format": 1 }, { "name": "plugins/modules/pxgrid_session_for_recovery_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "031d36bfb036be5320de10d98c16d6c7e33008e0794f280a20ee9f60bee26550", + "chksum_sha256": "334e6a36a312cd82103e3af41686ebe5fba1ff067e26ced5204bbb392bbe3d60", "format": 1 }, { "name": "plugins/modules/licensing_registration_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c68f7c71b9079632dedec44e0ca95a7ec7a573c63f04893f13b72e437d95074d", + "chksum_sha256": "9d6ba9ad31d635db24412aa750982fc42482821b3ee1acd6b3571f50757f02e7", "format": 1 }, { - "name": "plugins/modules/trustsec_sg_vn_mapping_info.py", + "name": "plugins/modules/tacacs_server_sequence_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "08da831e6623ad7af5165f16bc897afcdfc8a850e9961ac05ffd5dc8a09d769e", + "chksum_sha256": "82dbccd8a46ae6cbbe2894e54f9a0fe503c02ea351705ea7d079fe1125496505", "format": 1 }, { - "name": "plugins/modules/tacacs_server_sequence_info.py", + "name": "plugins/modules/sg_mapping_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d2c4208bbb1d7b973cf6fdc33ce729747b4c937e90acb20fdf0faf46c8a526b1", + "chksum_sha256": "54a0b58cf1763da689c16f4b2f3912bd0f3f6a96dfa1816d4b7a11e6cf8db529", "format": 1 }, { - "name": "plugins/modules/sg_mapping_group_info.py", + "name": "plugins/modules/dataconnect_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9b8258bde89556449361a2497362d3f8e0c553bc608e97547c507a6f7595e060", + "chksum_sha256": "69d5919d86041f3bf3d7f32ba6720c162e8165e0368b711cad9ede31058c1e2a", "format": 1 }, { "name": "plugins/modules/system_certificate_import.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e11880e51a2d9987109722d22f8f13451e765fcf6ce54662e64f18b9856aa48f", + "chksum_sha256": "dbac596ac6bb7456841a9591a69df3527e48bf82cf78feddf31c6500f0080c8e", "format": 1 }, { "name": "plugins/modules/mnt_failure_reasons_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1f135dfc43495d393632ccf47176c4fbaa3360964f798847305dc6b76d4e5ec2", + "chksum_sha256": "84366cea6d069a821d8cabcd550f5deb4af75df67baf7bbb35863199898bc69c", "format": 1 }, { "name": "plugins/modules/transport_gateway_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e2e380ac9be33987bddd909443fc6702ce4700fe7fffc5293b63bbb583df56d", + "chksum_sha256": "1e40a2d87828b48159c32a5ab798f8ad6741dffe81257ce95f61ae09af4382e7", "format": 1 }, { "name": "plugins/modules/network_access_network_condition_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dfd129e16e4ba05068d90f484ce9ed2caf859b5e7f815ee630aa8c0e41b92cfc", + "chksum_sha256": "66e707026f332f82158fd2012fea22d24ff86f290aa599b532e4ef34e19a66ef", "format": 1 }, { "name": "plugins/modules/device_administration_authentication_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dff4275c25e6bb8f7ee5cdfee1f8f201e4e81298558ddd4634d1dc89e83b163c", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_sg_vn_mapping.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "610aa1a0787cf030796834fe3af5eccb0f22d5f40d1e77252d50a6009f77b938", + "chksum_sha256": "4b693e5505c39c7694e72e228aaff5af8f068f7537d2a35cc95e0f7725f7f8a1", "format": 1 }, { "name": "plugins/modules/backup_schedule_config_update.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "357bf0d242ed777e7363546216d4bedb5968600892c6d611bd7c7ac06965d44c", + "chksum_sha256": "c1f41bdce3c7fb3c2a82dd5b94eecbbbb0db53e1b4488fb76a9254d3b4a70205", "format": 1 }, { "name": "plugins/modules/network_access_authentication_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "355d410bc22bd81b99efecb6c20678b7f4ead0dbf84a331a83fb75a7da9a3cd6", + "chksum_sha256": "c6ac7edb1debc0ea05a61a364c0eb790fdb27778c30a201c0cf592b3e68a3ed5", "format": 1 }, { "name": "plugins/modules/anc_endpoint_apply.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "610a3766a851751fb4b5a79a45174bfcdadbe4d5aee73a2034dc01fd458dc4cf", + "chksum_sha256": "fe21680d72da158ac8b28a2f7b2bcea76d2870cf1c605cffc85ff70b5a43f8d2", "format": 1 }, { "name": "plugins/modules/endpoint_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9dfff43d202d777f11a89b9f33ac17ea4c534871c134afeb0384f38c5a1f407a", + "chksum_sha256": "a5062fb00b4ca90a7bd677004552a6672b14fc5773bba33d3c630ede90a3556b", "format": 1 }, { "name": "plugins/modules/guest_type_email.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a603bd3163dfc94d857d15f42607314d8b08a7ee6e1dbd3a26c447f192a5cae1", + "chksum_sha256": "e1b5094c48c7f68b9977588a1276f51fadd56d6653d5b03280a7c997af53526d", "format": 1 }, { "name": "plugins/modules/rest_id_store.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "afa850a75e857541099c42fda5f897ea5632d39498c92fee10e8a0d7cfbd3946", + "chksum_sha256": "6c89b2fb2ba44a7da3fca22b4f4c3fdf0157c2f4bdc16edd3fe76ffa6be486d0", "format": 1 }, { "name": "plugins/modules/licensing_registration_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "911be5530aa33b81670ec4c47e699926637d4aff3469c0f912350d1d1a7b6197", + "chksum_sha256": "8e143bbbd3bb0225a2cad0e7c00e00998173ced91eafbd034f1f0963f6efe509", "format": 1 }, { "name": "plugins/modules/my_device_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "22ebc4e7f1c4854338f1ed4a87f6dc45787436f76003c4c6f24132ddbb509632", + "chksum_sha256": "748f7fb5d09d5eb40a2b621298f0df711ade50999329a6b2b2e24625a98f081d", "format": 1 }, { "name": "plugins/modules/network_access_authorization_rules_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ced2a9fb89ddc436506a80dcbe7138cfd2e3124995b98dbe35ba7865c131aa69", + "chksum_sha256": "3cd0179101a1b1efbe61a53a7cb97799ed08e6880bc32d7cbfc89fcae7e98868", "format": 1 }, { "name": "plugins/modules/pxgrid_egress_matrices_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c88d13c05510957731477b64a1a22d37b57c71c5e6ea29ac47239c50c7885d76", + "chksum_sha256": "523b21b2be6cc6e4b690615bfa798b85049351b5d5485ac890f3df7abb97fa91", "format": 1 }, { "name": "plugins/modules/active_directory_join_domain.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5519e9b36a9b507840af2a2fe3509b632850abf3c4ec989b97ce2675b790eda7", + "chksum_sha256": "113d4c750156d522edd5bba6c030644d9e654e0ae5f04fa73eb39122fec4c032", "format": 1 }, { "name": "plugins/modules/device_administration_conditions_for_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd302fa2d5f4cff42248ca4b601f62a0d69bb12a22ac75bbb7693adf6dbd2b6a", + "chksum_sha256": "2773bf27387c8d366320e3c5c77bbc980c9559ae372087c79dd483fc1896ed63", "format": 1 }, { "name": "plugins/modules/mnt_session_reauthentication_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "32f3d6671b467199034c9d5be512e4e16981ed9607da2e835fccd90312bcef04", + "chksum_sha256": "b2ce45b6bc3c47e65b3262807827399ca8ab390c71e1fdbd83f49559adc975fa", "format": 1 }, { "name": "plugins/modules/support_bundle.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b66fc0b8c2ef05feb406d90a98e72b2bca8cb1f10475dcf3085475a030ef7324", + "chksum_sha256": "4b8df8794ae6ef84a2e4ac025033160e625427d2e9abb6f77c35324ac5bec8c8", "format": 1 }, { "name": "plugins/modules/device_administration_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b13413a19b253f1da4d06a46a80aac94369bb25600f8dfac5379caccafdcb8ec", + "chksum_sha256": "a1a5863fb9eb462402511388a0c639b2439870103a278bfa5b6be90005608f70", "format": 1 }, { - "name": "plugins/modules/pxgrid_endpoints_by_os_type_info.py", + "name": "plugins/modules/subscriber.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2e44e36bc2a308fa54bbe23c62c0992fc9f945580ee820d5e1a8f782d5ed5390", + "chksum_sha256": "55c8d1822050944e73ee3ca1d8536fd57ebeab064bfd5881ce3a70877ed05d61", "format": 1 }, { - "name": "plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py", + "name": "plugins/modules/pxgrid_endpoints_by_os_type_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be6943bd0c99164b1371cdced35bad64eacc68a9be0d2573bd732d6cc84a6bd9", + "chksum_sha256": "6879191201617c64df2ef196f44fdfacf4515e504659376dc61f252502eb6f45", "format": 1 }, { - "name": "plugins/modules/node_info.py", + "name": "plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "64b77748f796e25921594250ff990733e76c51f65d8ad92a4f22db11ddf38990", + "chksum_sha256": "fd3da0a71a6c9aa56fd691517a7e2006251b511f17563c09daceb3ce4be732da", "format": 1 }, { - "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py", + "name": "plugins/modules/node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f76a9b056fbd03296573d92317b16e6015850ca8a47fccefee5c0177c3866b23", + "chksum_sha256": "8522a08959d780c1a5ba51814ed143e40fddc75065bfba19ab0fc85260d31c58", "format": 1 }, { "name": "plugins/modules/licensing_smart_state_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "81a9686e65c89f6fc5d1e6a6665ad7ca963c95e8c78c9389789492b2ef330d2f", + "chksum_sha256": "07e975c845af65bf8c846b1fae10f3d86701964d7dd79561c194fae378ddd680", "format": 1 }, { "name": "plugins/modules/sxp_connections_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8abd8bc5c49d29dc6b9055860aac985a90fc6870be87d4e287f98fded7e1e8b8", + "chksum_sha256": "385d9ceff4cffac0ad5569b6c541cde80dc25ff8a5f513e90314d410e04af9f3", "format": 1 }, { @@ -3679,84 +3686,77 @@ "name": "plugins/modules/guest_user_sms.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9a4b6d5ef9bbe30a76828069318d12e7bbc8d5615f0b6956c376ac2f50e8f95a", + "chksum_sha256": "cf01c8ef62234046237fd016db6586ddc6f15e0bbef425b852ea87bd2ee093e4", "format": 1 }, { "name": "plugins/modules/pxgrid_user_groups_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2fdb846ef843f364fbe41a98991eb6e0d3e3186834ab06f163c2a7b5849640e7", + "chksum_sha256": "ebc990799cf775a81fa9103b042a5998d29072c602427c8225365136b3867b27", "format": 1 }, { "name": "plugins/modules/pxgrid_profiles_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fbbaa36d7fad3f921518aea5e513136ea17de20f72237f88e299913e1010127c", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "911609cac367e95dac4b8deabccbb4d14b8178190e3370707662801deb4c0edd", + "chksum_sha256": "63b60b03369e703b7e98ac8698d2dc8541674f4d10b96cbad4d28a955e6f2e9d", "format": 1 }, { "name": "plugins/modules/licensing_eval_license_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9c5d81662ef0e1fc4d71b41ae99062cd7254ada9e509e2cef94908cf6c27fee9", + "chksum_sha256": "092ad108df75727a6971b82fb7d1faae739f2df3480e3b19961e59fbc27abec5", "format": 1 }, { "name": "plugins/modules/guest_user_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "994ca00be10e15e7f6b1c71a3639b4f83507a951f8c6168607836f11497b3f0c", + "chksum_sha256": "2e7089d767d922a615f4317503f763dea12565f10c53e88b6f9e9dd1155a9c18", "format": 1 }, { "name": "plugins/modules/node_services_sxp_interfaces.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3a3a527747db94ff8c804200f767529519b2ace406a98c3ed3fece5b70226e88", + "chksum_sha256": "c1f9359b6fd1cfd0bbda6fe0b62db6f5d577c6bd0caff3e0d8e18cc5efb6aa59", "format": 1 }, { "name": "plugins/modules/sg_mapping_group_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc13cd394696d01c55656e8b00250d541736a534f5a648b9791aa5751d0b7637", + "chksum_sha256": "896fb1b8f2b0a354b94629f9f69fe4d56b72c90cb0dc66d0dc0cb8b5460f2d61", "format": 1 }, { "name": "plugins/modules/network_access_conditions_for_authorization_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "848b004b036120fbd6d687dfa381d0db88753e29c42844d04e6c361ebe0e6314", + "chksum_sha256": "f7f6808078748da83fbd3bf33193a980e16a478823ef26545bf8376fe4c513fa", "format": 1 }, { "name": "plugins/modules/network_access_identity_stores_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fff63eabd8fdd2ffd57dc8966504713a573ed44b30d3cfc7debc6ce506e4a884", + "chksum_sha256": "2bff7a962e88648ef38e6a5fc7e4e769d6546ab4bd5530bf229fae94fda7d0cf", "format": 1 }, { "name": "plugins/modules/pxgrid_account_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "59237c2be206ec01348faf847574abeef718adb1115a84338ce8a2796f7dd45b", + "chksum_sha256": "798828d1f1dea8ce271d0d85fac10ae88c58761ebd6d2b68e9654648df813ffe", "format": 1 }, { "name": "plugins/modules/pxgrid_access_secret.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9b0af3e95064e32b700298d466f522669130af2130b4e1402884daff2b05f590", + "chksum_sha256": "dac8bbd08f48b3dfeb5b2965cef8a570be1b03d56cb778c48d1c94bfe4929e5c", "format": 1 }, { @@ -3770,56 +3770,56 @@ "name": "plugins/modules/device_administration_authentication_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c9653358026069a2cdbdd10cea4c7fb4a79b4b2be1a5b9f059e2833e04902a67", + "chksum_sha256": "2216f1e10d9fc493239b212404de1152a8e93a5424e40781ec2c7bc99b3d419e", "format": 1 }, { "name": "plugins/modules/active_directory_is_user_member_of_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c84638ade6c9d819a7b4bf85bc6bb6061029be4d7fa09f09eeff664feab9da0", + "chksum_sha256": "392340331831e8f57852bc3fe52fc67346b503b8014aacbbc5daf9b37e12a2f4", "format": 1 }, { "name": "plugins/modules/sms_provider_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "84c2dbad33998aa68d959fe8e859ee95133f1ec24a39eb1b0ddd0bd7a12d6001", + "chksum_sha256": "30e61a30963a7a6953ed62f1cd59222baacef3ba48d6116ed679213367c48626", "format": 1 }, { "name": "plugins/modules/sxp_local_bindings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "66ef6885878cf7154e5e4e7fb8b54458447eeacb706732c27b470ef78823d8f9", + "chksum_sha256": "ab261305426b3606760af2e46fe6d00a84e943192bf2ad51e859904e12680fd8", "format": 1 }, { "name": "plugins/modules/aci_test_connectivity.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ff36b7dabc32e57cb7efaff225a158ce4632a8fc1456283f508f63ce18d5679b", + "chksum_sha256": "69b1406fcaffea2e9d7677bbf4f308bb16501522b18fdf4f4255c537d5375654", "format": 1 }, { "name": "plugins/modules/device_administration_identity_stores_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eca8d2684177f28d15847e09bf024f42eb01de3b60de51d37b6fd03882409dac", + "chksum_sha256": "47fc19911d0f0cb5ef9d7339d2241caa26ed596e894bdd5bb69d6de031366ce7", "format": 1 }, { "name": "plugins/modules/id_store_sequence.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3748d088d7ab8d25e27863a2ec79206039e3430f19decf6a0d3d7454968ad3bf", + "chksum_sha256": "06a6d1fce26994757c7825ea6defbe0c29b653011e30a235afff1ce65136accf", "format": 1 }, { "name": "plugins/modules/sg_acl_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bb133bd2fd27a0a3071d4ae83d72a63e99584b4bcea54b6a8033cb4ebb7efa89", + "chksum_sha256": "3d36d21be01c91c21b52a0ea673b78b90e660cc3a883940e8cf1a9d6e948e721", "format": 1 }, { @@ -3833,98 +3833,84 @@ "name": "plugins/modules/pxgrid_egress_policies_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1916ba48da7234bc9b8ccd5f5af6e86cfcc575840c7bbdfca98f7f496a7654d5", + "chksum_sha256": "5d1def0e1c8170e585c9c59e841c35e8f51a917501ec0e719150066e29462832", "format": 1 }, { "name": "plugins/modules/anc_endpoint_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cea3eeda9790836208579368d7b7d5987d9f5d75cfb8911ef0fcb414e4675c18", + "chksum_sha256": "5d0ed60026d2b75683149dd72c08d85ce9c26ea28566c600a1a9c966e4731420", "format": 1 }, { "name": "plugins/modules/guest_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd5f608024bd7af70192899e874a180a90ea3cd36106b31bdc81fadd1563c7de", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_vlan_mapping.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3f06f4f5b60a3251ea046118605c3f68bfe3f13762a274fc037e5f3412630714", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "62afd7e9eeaabc2bcca6e81e9bfe1c97a47682f21a65756eb1d16464471feb49", + "chksum_sha256": "dc502233f4ebb19bd8baaf8ff496101371bebfb2174243d89140fc85baf8d501", "format": 1 }, { "name": "plugins/modules/sponsor_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "453ad3d3bc410394f03bb22bd31ec73c5a96aed9a5fa36baffe1d16133bac340", + "chksum_sha256": "95514c959d1472f12f379ae7fba7ba17bf369ba32c73538ccc0191d04e047056", "format": 1 }, { "name": "plugins/modules/system_certificate_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ba54dc996eaa125b09117eeb3e99c033be9b07db7baa4e53bfcec706edbbe429", + "chksum_sha256": "b891fbc93ccb6ffb7c1efcbd0b660689a9ed9555c42ec34ff43710c1a1d218f0", "format": 1 }, { "name": "plugins/modules/network_access_dictionary_attributes_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd1779e76da20881dbb26a4687169d340cae592878b939db5275d6f79517ab90", + "chksum_sha256": "02eb22fda74bfa91c4c6efc3cb5e34467020ec60d2f9a722d838e70269b4992c", "format": 1 }, { "name": "plugins/modules/px_grid_node_approve.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8725c1f9d3ef02b7dd34b34a9be3b59037ef3be81e7cb9c29e94e0f72e77cea9", + "chksum_sha256": "a460cbcfddbd6be09f3e917dc6b8a222204c846b94e3af6c49196b1e6a9f3064", "format": 1 }, { "name": "plugins/modules/device_administration_global_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7baa7a8eeccfe78b56c6c85e20e9db931c7656fd318b7e1aaaa38832d92da537", + "chksum_sha256": "89e67650f326e57f65431f863ce0c83116db2fc27aae9fe7107f88d16fba7ac3", "format": 1 }, { "name": "plugins/modules/sg_acl_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9d43f0399efd6a0310df283495b940af3fb0d335ba4bfa7c14ccf6cb142adb83", + "chksum_sha256": "73e37949c269a92d51118fba46c5aec3c01a4805ae11ecabf34dece0291a9da9", "format": 1 }, { "name": "plugins/modules/hotpatch_install.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "71a0a499a6106e011af26bf1fdf61581e19740b8ca29b244b88332643e9d2f70", + "chksum_sha256": "e3931a962d0425130321b383c1374c205b818f3862f434acb3e0582e2aa7ead5", "format": 1 }, { "name": "plugins/modules/active_directory_user_groups_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f9fe491f0aad3a590f466359db5bcc9b190abdd48e271d2eaf721c615ef2824f", + "chksum_sha256": "5ce0e60fe79af6b6d2ba5ee11f5f01bdd80b5292d7ad365dc16f7bb62ad9ad13", "format": 1 }, { "name": "plugins/modules/pxgrid_node_delete.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "51b1d3e5d694d3d2a85c722b4b7cc13d51e5b7e289384353a4295049824a2176", + "chksum_sha256": "67f1f80ae6dfc2f01981388e29aad05165795bc025532d0d4310dc8df83e63c5", "format": 1 }, { @@ -3935,38 +3921,31 @@ "format": 1 }, { - "name": "plugins/modules/trustsec_vn.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6e1d2a2d6a29d28cbee55f0afc55aed58aa9d7f11cd7795884969b8cf9268e73", - "format": 1 - }, - { "name": "plugins/modules/backup_last_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ab709a98a93f78fc7a8bf7a1176e4ff711e760cf5fc484f9fecb8777f4d36fc9", + "chksum_sha256": "7b78f418fa38d677084fb822fa2d09f118db3fad42e89258dd737ee7f5c7c048", "format": 1 }, { "name": "plugins/modules/deployment_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a6571a479e8007f5ba16a09064d1ff1d873f020c126d5683b1995cd922e4f87b", + "chksum_sha256": "d05249cd5e5409a1aa6e1b63570775c7ca533217bd6d5bdda3b946e9e870488a", "format": 1 }, { "name": "plugins/modules/sponsor_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2e2b7b7e249a4e30984673ee5cb38bb6ea17c4b1f2c55fd789ae773374db5c4d", + "chksum_sha256": "cafb343c491e9eccbf48d6910110ed8fa59990c51be6cc1792db13450417b03d", "format": 1 }, { "name": "plugins/modules/csr_delete.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a036c44cc51ce4f2998dd36de48c98c4354b688797573aaafa04a6d58bd137fc", + "chksum_sha256": "3d9cf9e7c183737edf91c9ce7c523af5271caa44838591b781887656c07e045e", "format": 1 }, { @@ -3980,1505 +3959,1505 @@ "name": "plugins/modules/pxgrid_session_by_ip_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0f06c8a3c290dd57be89e359f11f376ecc0eb4ba4fe361db036115cec4d6a0a9", + "chksum_sha256": "a2623aea5d62e93d061703884869a27d158912ac0669c22a9a7c42ef5a84df36", "format": 1 }, { "name": "plugins/modules/node_replication_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "053ede147e5a9ec8000057b51a9fc9e537fab9438aa734a0e5cab29ac2b99ac5", + "chksum_sha256": "9fa2e77980a669234911cbe0225449bb6f3a548e220624e44a1405d4014830aa", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7f560c323b6f821a130c2ebd077bbe33b2d793b30ec5f2df8c04779822f23b79", + "chksum_sha256": "6cbacde8df0e160ea8007fe5f926159b1af70194896e1fe93296cbc5f1fca3d4", "format": 1 }, { "name": "plugins/modules/guest_smtp_notification_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7fbb0a9b98dd32cc6458f797f269d3abab08c17147d413d48bdb2b691f8ca969", + "chksum_sha256": "a113c197beff41107c9522004d60993e53174c1b4193e56f8dbc7c09f4d2eb50", "format": 1 }, { "name": "plugins/modules/node_standalone_to_primary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9350b93054143f7ef3d7f9407821f977d34161be107fb916be92950f0d4d5276", + "chksum_sha256": "80e251a43c388dd7c921437dd4614161b0fc8da80ca73df2fe37e74c16cbd580", "format": 1 }, { "name": "plugins/modules/endpoint_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8f80ba889e76fa92504a40629dddf64fb708b58cb8ef9f9bfbc222218ebc3062", + "chksum_sha256": "a4bbd0ffcad1d1415e8c0c4a14fb246d1d4ab3b58dedcf3fe5ea39698817866a", "format": 1 }, { "name": "plugins/modules/sg_mapping_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dfcf94f91f43988535678011d11c856be02c6e1489ed1c7e3bd2ab655d4eefb5", + "chksum_sha256": "bf6af349ea1a7235560bd8431a0c061bfda1f534f6bee96950f7b018a2a7170f", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell_set_all_status.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "005cc5a852a3adecb113cdd9eb9731c9e13aa6bb1ec07736bd8148134894b7e5", + "chksum_sha256": "8a29cee6650c646328b66ab750e3261551ec3ee3b3097f5c528e99d0f9caa733", "format": 1 }, { "name": "plugins/modules/pxgrid_node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fbfa20f843a959e4d2a66ed86d23d1ce8d8c35a2443b6e5b743defdb6c3eb4d2", + "chksum_sha256": "7fba508877c438c68f2092df4a7b4dcaec6dd510c266fc26372831ad6239724c", "format": 1 }, { "name": "plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e254d2eef610a8965a9b7cbabd902c4194e35a381a86ed18edfaab9fb5a627c8", + "chksum_sha256": "0e59d1c968814b6c0dab7d9233f0c2e26cb9c037f385ecda25290768ca8ae20f", "format": 1 }, { "name": "plugins/modules/trusted_certificate_import.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "952473bc6d97f0c21161b864f0123d12894575cbe33bad482ff3802fd614e208", + "chksum_sha256": "d74fc6796e27f3f666bf81f9f082491d902b36a56bbe234e050c3fdfcfcc030a", "format": 1 }, { "name": "plugins/modules/network_access_network_condition.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b4572a35271c07bb023493826b6968224dc9027dc5e2225d66bd07c0bfda6a6b", + "chksum_sha256": "a2c19331da2a9a784bdf4b80748b8b3ebf566b83e01c84aeed2b8f2fdccc24cc", "format": 1 }, { "name": "plugins/modules/device_administration_authorization_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "18b2049b455db48c1b5062df71f50f89e46f5b741689ebe873041d755b1b12ae", + "chksum_sha256": "1eb8aeeed5f6fb7ad12dd76b8b900a1515ac5988b115f7eea36d0b4367fb7717", "format": 1 }, { "name": "plugins/modules/backup_schedule_config.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "98bfd0422fd117ee0a7879ddb23af88d94cdf7af3508f45a163432333bc9e41e", + "chksum_sha256": "53f2f0cd988436f036b16318e7102e2d1ef51f91ab5482e703b3c4cabbd5a9df", "format": 1 }, { "name": "plugins/modules/pxgrid_session_by_mac_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c1da72c9b6ba5b0787aa206fc654329bbedd04b3665190efd557887a9e9e9586", + "chksum_sha256": "a390646559f4b45bd5ecf7dddd0a13c2c0bf68907a16a1276f3dcd6e019c2693", "format": 1 }, { "name": "plugins/modules/network_access_local_exception_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f66254716611d556c6a7c7acb843519a876563c5565972ee10e8817ae2ad0f37", + "chksum_sha256": "0e5a2bc4e2226a937203a521aa4ea6588725a67dc9440b39c281c3001b9a8feb", "format": 1 }, { "name": "plugins/modules/sg_mapping_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ce82c1556f007b4bbeca20c233d0a3ae4cf01f58f55fd600aab68133a78faba0", + "chksum_sha256": "2c86a83f3f03df71b9a9f0ad23f5edefea91445259ba2f6a5610cd734242e2a1", "format": 1 }, { "name": "plugins/modules/network_access_security_groups_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "077c37b32e25e35871639b689c4c849a144374f45b11f440e242ae2d54b7c5cb", + "chksum_sha256": "132aea148538582861c38e7b7d828b6fddd1886760ba73f92db3bb004626a744", "format": 1 }, { "name": "plugins/modules/device_administration_global_exception_rules_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4c3b3d9e788bd3f4369ed7fdd02a6b04340ca2f0c69999d9aefdf44266518407", + "chksum_sha256": "599cb938596c3fd993c1a5c4e7374aa40f34410a25a68955cf714d09208c5016", "format": 1 }, { "name": "plugins/modules/device_administration_network_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e5e8117343c31a3f9b9eed1f516f33ddca5603c06df666c1b32be2dddf85dc12", + "chksum_sha256": "8884d0f1d01999a9ebbefd81a55f08b4ac3d35335293e9b860b2325c7600155e", "format": 1 }, { "name": "plugins/modules/network_access_dictionary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "01aa09dc88bf5243128a3ff9a0189604815890d8aadfe6256376ce38319a42fe", + "chksum_sha256": "be74a8e486006207c7a811f7578e76fb9e014bb60f3c71dbe4cb75ed7f5b800d", "format": 1 }, { "name": "plugins/modules/sponsored_guest_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "69c4ae7f7669cb849fa9141f77cda5d744f45ad90c8435f179effd6534301def", + "chksum_sha256": "eb7ed5d6de0033b9ac29ef3f0019d8641786e8035792643fed1cd1ab099d9dbe", "format": 1 }, { "name": "plugins/modules/node_group_node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28ea18759009a4e32813a10796b15db25bc39ddbf99509f935ca10a61cf1e488", + "chksum_sha256": "750421162829c5ce10e54ca66917cec11cc3aceee353c541add40fc74fdc81d0", "format": 1 }, { "name": "plugins/modules/sg_mapping_group_deploy_all.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6fb29adf877b117741ca1445bfba07c94b027858148eb0f233bf4a5662ae0630", + "chksum_sha256": "465afd9c1280c55f7f866b93d62592363532329b4d29626f823ebf5aca4e02c3", "format": 1 }, { "name": "plugins/modules/mnt_session_disconnect_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2d4c14f15efa51502db2bea2da3a6be7334fe0079eae81e301d6aa11fd33ad41", + "chksum_sha256": "928b75e31e821d6d8f85eb19ba70d5fc9eb633d8a3d94e7f4b2a467a1f500b00", "format": 1 }, { "name": "plugins/modules/mnt_session_by_mac_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2d6f2f202fff113dd44f8fed3c9480cef3300c62c24fcc8ad4d77095524f4f8a", + "chksum_sha256": "3f838a5a43a4d49a1d8014bf910dc69bcf416ce65b018c8dc4f5493de6b4a987", "format": 1 }, { "name": "plugins/modules/aci_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6095a6450d0cb6f5571f5c63ad6df10ea7047f2ec6c8c6ba01ff203ca8035d70", + "chksum_sha256": "054f8da3aa7d75e80d6368e6291f65706b6018b3354f86a9d83dc394fdcd6264", "format": 1 }, { "name": "plugins/modules/network_access_dictionary_attribute.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0b4c39de1e8f7f8d979514fbdfa78fd79c81334ed097148efad5349ece835009", + "chksum_sha256": "64a7414da1cca2e1525d343b3023b413290ee5d0ba8cb0a18368517f502194c1", "format": 1 }, { "name": "plugins/modules/node_sync.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "352bf7762e19acb99ae4837f024161899c985162461dd813e52196a5f3a901b7", + "chksum_sha256": "ef27395f52d776aee8b2b1f16f5a1217ead7e25418668010c9741ce82793fb15", "format": 1 }, { "name": "plugins/modules/endpoint_get_rejected_endpoints_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6a57bf56d7a517ba5c0b6b02c767e380f9e544226ac76cba131875d59db01ecf", + "chksum_sha256": "ba9420c59d0d036c66b144beb2d2d9fb3b052a74c5351d5097b6158c3db1dcbb", "format": 1 }, { "name": "plugins/modules/anc_endpoint_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fa247d220b707e219881f4ce7667165f02f603943966b50bd038e34339587c71", + "chksum_sha256": "302241ea02e2aa8c92899a39fba5cd53584f99fbd6c8932eeea9fd718c2bc547", "format": 1 }, { "name": "plugins/modules/licensing_feature_to_tier_mapping_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "381c7fe17ee0b680f8a94de20e93d2038e5284321f1ef7c66430e32773d113db", + "chksum_sha256": "eed26481748e0b3999a12d26ae44d5ffc7fc59f584bd469b8b704ab9cc1ddcf6", "format": 1 }, { "name": "plugins/modules/mnt_session_by_nas_ip_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "adf77d487a5fe8cc21ce33080a517d9b9f64fdee0dbba05395ad3935d08da86c", + "chksum_sha256": "388f3cb3c7e525e0f9a66639be2b7bcf1185afd65aa505c787eb1c7fc3213e80", "format": 1 }, { "name": "plugins/modules/node_promotion.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06ed5d878c6b26aae8ae3c2892b92793eddc28ea5df04a2f1a1648d4e4b27fa9", + "chksum_sha256": "99ec57d08a5609872dda46df7a131b37f5a13f4cc1e8bd60877c0bf1e1e61e9b", "format": 1 }, { "name": "plugins/modules/tacacs_command_sets.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06cffe5d8593f0ca33b52d9c3fa6fa4bb71aed650519740854b0fec9e3f5488f", + "chksum_sha256": "0320dc2599e63a64fc094b258b0d31b03a5461173df251d592239b62034cca06", "format": 1 }, { "name": "plugins/modules/pxgrid_service_register.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1098f7204704211c5ff73cb1f676092a267501b9c87cde062a2b23e7a5551b17", + "chksum_sha256": "592f8d9ed04c8b3052fab71ffdace5bbd8e877785b8f7a976a0ca06ae52cafa0", "format": 1 }, { "name": "plugins/modules/guest_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "802dc4b55ea3bd1d0ec9a1297ad9dd4fac3332da8f75417aa2676907bd7a5524", + "chksum_sha256": "303a13936efbc79fdb335fe060e914b7642270bcab224de2408bb4491866a943", "format": 1 }, { "name": "plugins/modules/network_device_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f0d6a6dc289a318ab1b9f7b088bc717b384ba9443bd0267a2c3876109dfd8dfb", + "chksum_sha256": "0a6ae9cae466b24c6f89ed26beb98b96ae23c2006fa392fae57b35d8d21a7064", "format": 1 }, { "name": "plugins/modules/tacacs_external_servers.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cf9b0857e72ce3e98d86d088074bf6fe0319ce60fd9008e629a661ba73cd0deb", + "chksum_sha256": "6a2d34d1340291d32d7d0a75ffc349a9f373fea318f798577f1a9bc18af30459", "format": 1 }, { "name": "plugins/modules/proxy_connection_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3a7695c64bef263a6af5b1aa53b2701776d2014256614de45572b25032c5a5ab", + "chksum_sha256": "9ee97d1c9e53a778ed5d7016a15e2476aa7be7dbb5881a9528a37434398a4ee2", "format": 1 }, { "name": "plugins/modules/pan_ha.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "413b1931fc7449b44f8928f28cb9696d0353d3b0e854f43fcc31825a94ad29c6", + "chksum_sha256": "e88ddf214d69522d4fa0f339857a5edf2645c642dfcf70985955d2f153bd0434", "format": 1 }, { "name": "plugins/modules/system_certificate_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "211715a20e9754d855649ad5128b0eb73abd078c9a0a8470e013d54e8932266e", + "chksum_sha256": "0879141fb1e747d2396e75a53c6b7578ee0313f96d3ec03da506f729f026b400", "format": 1 }, { "name": "plugins/modules/telemetry_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "12c51560a1f149cca83a91bc44da3cf916da95c3a02e65f8e2fc8d8b8215a3c2", + "chksum_sha256": "4e1e94af427bc360c5e2d7ab1b0318ff36e1330ae3e7a68ff15027798df198da", "format": 1 }, { "name": "plugins/modules/sg_mapping_deploy_all.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e025be0193dbdd9968dfea8cabc61f5075240404d2d999e6736adead4e58db5", + "chksum_sha256": "c9ffae7055a016b677ee64586fce1fba74e5cdeac39d2356c3c19b71d0615add", "format": 1 }, { "name": "plugins/modules/endpoint.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "699eb3e13bb65698898de83f0eaf22fd9068554065d5e14836124033eb1d49f9", + "chksum_sha256": "d3ca520ea3b391e222f10e3db2066dcc8aba9225fed6a6ed4cac9029dc5c83f0", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell_clear_all.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f35b3fe897776ccda928130ed36b1a3e300458e116690d93ff72c229548cc83f", + "chksum_sha256": "37c4a01ba9712458b187d4f7a2ebc8c1abafc59d35e46a821fe3c8289634ee34", "format": 1 }, { "name": "plugins/modules/endpoint_deregister.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e303164d9fe5ee06a34e62a53fce871a8c479d7e10fbb60324653450bc20ac6a", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_bulk_create.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "48bd3fc93d451c75292fb7f85e15d532f32d7afe717e5e507845bad142de6961", + "chksum_sha256": "a2ddca60a7917b948f22ff4b7c3e34ddc7230afa3bc2de39316461c83242463a", "format": 1 }, { "name": "plugins/modules/node_group_node_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31da023b0a457ced3a88b43c42882c2f0f748e391fb2cbb7ae479dad4326fee7", + "chksum_sha256": "d0fc32454bf5e66f351919851ff14bae266323f9271e814b696fd41209f6b54d", "format": 1 }, { "name": "plugins/modules/system_config_version_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "97683e0e651acd5e209622a62b4fdbf013838f4d888bca1bbf03274cb44630ad", + "chksum_sha256": "85c283de9723c7cc0471b7deb9df5cc7619440ee0f864ce7b403e1b78541c7e8", "format": 1 }, { "name": "plugins/modules/downloadable_acl.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "26d63b7ad302a1d031fffe0e331cecafef417ad7fc0dc93ae09a145bba99ddc1", + "chksum_sha256": "88aebabd41e114775ba25632aa9d34fc806593b841dfaef2c6872ff44a473d53", "format": 1 }, { "name": "plugins/modules/csr_generate_intermediate_ca.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "539f18c21eabd2c451057b07e5bbb06e8719c7aa87b382d8a4805dca646408fe", + "chksum_sha256": "7043f73b25c85cec1b4c8871e4672ded7582652a405fa17c555af3f7a1fe0467", "format": 1 }, { "name": "plugins/modules/guest_ssid_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d8a88b859d84110411c6862724701b9a3b2eb88119d348bc3b1526c3b3591446", + "chksum_sha256": "df41e0151e33bbabaddc14dcb1ae54921f33897ca0725134d80e56622e36d6e9", "format": 1 }, { "name": "plugins/modules/anc_endpoint_clear.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eaa73038fe135167b2e00adc434916318a04d3e52bdb1d660e962201d6db5d43", + "chksum_sha256": "eedc32e574d15d50f354af4ce5bb827a15d460ac00ebd605896edff86d9a41af", "format": 1 }, { "name": "plugins/modules/sxp_connections_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31873c73845753e684f7cf14917fae616afd57a808ed0786d1ac286ca0c45e3d", + "chksum_sha256": "84e10a79b7ddd984af08aea91e7c67097dc2e0ff25e17a76fb9da3846c7b88b7", "format": 1 }, { "name": "plugins/modules/filter_policy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d48cc14fc5dfe0a12fbb4c9ab394f6ab3c1aa88d89b60ce58ed4c8c4666f989d", + "chksum_sha256": "5a4ee69d83504f63cb90cdede8343dfb6b6f123e104b3f3081ccb4de0b0aca10", "format": 1 }, { "name": "plugins/modules/px_grid_node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "db4cae3a3d80bec6ac08796a3e677bb74321e5416d439a3819cfdcab8f16e944", + "chksum_sha256": "e3174d034610bcbb566c84d5bdc9516bb2d645dd4dcd4da9b5a3b7e18647c2bf", "format": 1 }, { "name": "plugins/modules/internal_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f780bbf7849c2cc1bd824d325c5c63cd639abb41e075589437cba72144395a51", + "chksum_sha256": "decac83ce362739183afe6784a3fcb60598ed04b5e27395b5dbf000a84d6dd08", "format": 1 }, { "name": "plugins/modules/licensing_tier_state_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "23ed4210cdb2bc416f1a310f3f3e45ecd48e7b30b72fa48be9ab77352f3191c0", + "chksum_sha256": "61a3cb27c81ddd2b24e850d7f1a06d5f7aa4501311bdb0aa394e8a1657bc1d39", "format": 1 }, { "name": "plugins/modules/anc_policy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e87209a5ea91e37577f3a0cad243f5ac90d25a9cf44f3ec8db4427eda171873", + "chksum_sha256": "fd48b6e6fa1adb5142c672481943c4595fbf0a7c19b685a02a34ba71346b1eac", "format": 1 }, { "name": "plugins/modules/device_administration_global_exception_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2cd1badfd87cf1b240a6441f8c3c0ab5356199932042655cc6d41de5d8bd0a47", + "chksum_sha256": "37f11866c9db5c493a42bf69b755bf6a75b0ebb9f1446a7e1cf1dc68ba24cd88", "format": 1 }, { "name": "plugins/modules/sgt_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9b7252c14e5d2edbf0de791395b29c314ff4a7124376552730b0eeec498b76de", + "chksum_sha256": "0314620f736cd3b52e5e0b0daa6cee1c5a4b81f4b4750db1014e15428ed7ff93", "format": 1 }, { "name": "plugins/modules/certificate_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7fcbfc2963d579d0a8e248f6aa15cf4be125ef138499b6b91c32fc4f179bf4be", + "chksum_sha256": "854360af02395589593d7bcc70860f21668748ff4be0584b30c10e64fa3e3e8e", "format": 1 }, { "name": "plugins/modules/sg_acl_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7dbd65406f5e2d6bd9e6ae9235c2444545982af7f383b804fe2dc98d4aaac1c0", + "chksum_sha256": "85248ccb3dfa12c2d39bc9229b8330d38a0e20ed302adbd2e98e985909ea5204", "format": 1 }, { "name": "plugins/modules/patch_rollback.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5419c9b5ac7ff21e34a6e5f28ffc81e401b1cf03393bb1d351f6c9ee5e0d344b", + "chksum_sha256": "3233069812fd1b2216d3028928cb27cdebcb0967a8548d4f00fcc8e69a75ce98", "format": 1 }, { "name": "plugins/modules/anc_policy_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "898129165bd7d21d25c1a09562829949721a314e02b543beedb2efcbb02bba2f", + "chksum_sha256": "7436d0ef8ddf89f89c57783f432e793b3cc1e513ecf99d65f6eb16bead437643", + "format": 1 + }, + { + "name": "plugins/modules/dataconnect_settings_password_expiry.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c66810eeecb2a946475a1bd433e0c281e060d2214b343d5feea2eb8a7879b14d", "format": 1 }, { "name": "plugins/modules/pxgrid_node_approve.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "00135c9545c4d1bc1d35d09083f71801e59f19b49a00eb23a69b21a374996000", + "chksum_sha256": "b06a5996f311f83bcd5dec8223fc1c7e2caf3ee1de058211280abf9b7b05ebc1", "format": 1 }, { "name": "plugins/modules/network_access_dictionary_attributes_authorization_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "451028ed51fca158ab151fd748590f141581d1fc0b1a51e7a64682d9aabeaac1", + "chksum_sha256": "3b627f20f6bf439ff07b4e4c164ba9de4d56f6f9f0718aa8a1e207e5107205de", + "format": 1 + }, + { + "name": "plugins/modules/connector_config_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1b02dee83a5885f217e8b6f3eb36038c9b7ae92483e220d725878f580d8c4199", "format": 1 }, { "name": "plugins/modules/guest_user_reset_password.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9d41516e5bb4558377cd006d5cdeddbecea671f8bd0699582ad71f1f6dfd7d1a", + "chksum_sha256": "edd84d13bd4585b21bf8f2d3f22618a68f9a7382ff894375d55edae29276aea8", "format": 1 }, { "name": "plugins/modules/network_access_authorization_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3f79df75da41a9cdfde8b4ea8a235b92dd2057a2c09fe6c95c3d46bc833c6944", + "chksum_sha256": "c6c4c6eb914b018d631c7d8c2554d25dad66358fd4fcb7bea10e5aacf2afb04b", "format": 1 }, { "name": "plugins/modules/mnt_session_active_count_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6d05929816d0942e7da62e635e794e66ea8ec9f8443e79fc7998e8428a81164e", + "chksum_sha256": "51d442b3b9d20113be6251325fd453aaf74da8ad9a687b8b5071314aa504ef64", "format": 1 }, { "name": "plugins/modules/sxp_vpns_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "43bf4c7b772f598c200670d52af19e3b0bf21f50690d8faf2b2358e3bb0ed848", + "chksum_sha256": "d3f85081ffd0db6815dd8c437fa1804339a497695002f7a3dd38b4a739cf7d8c", "format": 1 }, { "name": "plugins/modules/portal_global_setting.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "290372e920cdeba83bd0d63cf2fbe6f64a1e1b01446e468dfd70bd6528587a59", + "chksum_sha256": "b54fc63fffdf5b95cb8d4b96b4f2eccc8342028595c39297387f4352c3b9b2ae", "format": 1 }, { "name": "plugins/modules/device_administration_conditions_for_authorization_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c4ae54deae540aff65316b9d6d3b7363adf97443cadea2d4dd598feab2559dff", + "chksum_sha256": "ac0ac34579d1eb813b436f24e5ff6301aa4892012fce09aeb839e7c6303bda07", "format": 1 }, { "name": "plugins/modules/portal_theme.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8ab6a18f061e1b6a9746c50079722bd0f28fa259dc0cffae5fc35a50900a7b1", + "chksum_sha256": "eac74a6eab83f7eea6b4dcb79218495d9be828c5055b952d320b95abefd9f903", "format": 1 }, { "name": "plugins/modules/portal_global_setting_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "530fb46e6adf6e5c0b67168331a4212e8d541f4627f8b8bdb324a2b12ab27fee", + "chksum_sha256": "e832880b77d196074d3db6dd2ecbd5d8a113258054b3fd0c6f1db4e8d80e6549", "format": 1 }, { "name": "plugins/modules/sg_mapping_group_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8f50106fdf496a0ca8030b52274c932ed87ebe06cff7337aa1736aeb7ec0f77", + "chksum_sha256": "fae0b02d5163f8ebbed8648af13143912a5ab3863f4dc432a8bd71b77609a4c0", "format": 1 }, { "name": "plugins/modules/backup_restore.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fe58ad025a1fcfe393cebb7f0cbfe2b6e1db414d757f25c7507a5739c34b1b4c", + "chksum_sha256": "9adc139c28a598cd729c8cfe383aad08619712a6b33caf6f21802bf62bdea82b", "format": 1 }, { "name": "plugins/modules/node_group_node_delete.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dce8e3223c9da1a63493ff36349885467cb4813119f2cc9f6d190709b8fc1c2", + "chksum_sha256": "d7d21f4ad4493d9a1e84787d34632bf37c55084f6f79f5f084fb97899e255dc2", "format": 1 }, { "name": "plugins/modules/sg_mapping_group_deploy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3fe9329d3437e6a596e37dd02535a4fb8a6010f355cf4204cfc98dacefd5bf10", + "chksum_sha256": "fa70dd51e24afa87b6842eb88077010e0a01196ebf2855813866568d6179538c", "format": 1 }, { "name": "plugins/modules/allowed_protocols.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0f9d1fa3d08778160e6a843af3ae861c14bd9df23b6980467ef5c88e3ed932b4", + "chksum_sha256": "5fd8030b06461a911f78269b93e6ab1eb16e486701e9f3d0b4e163965ef40a14", "format": 1 }, { "name": "plugins/modules/active_directory_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fe4ea3aeea5b2d49eaff597347dfa1c75cd404bd288dd71efb326ad1cb49ad56", + "chksum_sha256": "42b2ceb4e49afe80bc417544029f550291558f42198b49addcac44946c7a617b", "format": 1 }, { "name": "plugins/modules/sg_mapping.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b9fb1c9231ea8e3f8678a606d9dd20355f7116459379937a1c42d51291d45b29", + "chksum_sha256": "e6a62e48d67d99e02e6846a1319c945328d01bf66c3f6885b7812865e46b0410", "format": 1 }, { "name": "plugins/modules/sxp_local_bindings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b2174c22447e4e7ba36f060627fd856249d48c43bd63439198e507fb7b7013a5", + "chksum_sha256": "135b08abf5d4b53db32136e5d6990b28fe93c49c733e7c304102b387f2135f8e", "format": 1 }, { "name": "plugins/modules/support_bundle_download.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6ec14a0d17d20cdc50f1dfc7a4c583682e044eee210836876cec9b427098ab09", + "chksum_sha256": "31a5652b2de6d2c210928246dcce7c889ccc53b66514527fc5572e062724bbd7", "format": 1 }, { "name": "plugins/modules/self_registered_portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "55f29c5d52b1d1b93c256c45814935de5c3587124ec35f3da691209d0a4c8017", + "chksum_sha256": "1f89c65ddda5385838c739f0bf1225ded48be6c2011b4ea0d718689ca0378f7f", "format": 1 }, { "name": "plugins/modules/node_secondary_to_primary.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7a428abf8c2bb0c8b5c137446a98fc5c93b52fa026fd950154fa7ee42d82bc17", + "chksum_sha256": "65ae947ee89f1b01906e504a9f6d50db8d646148d31b810da2dcac54badf90d3", "format": 1 }, { "name": "plugins/modules/guest_type_sms.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87202258bf2865484722c6208fe771819a5165fca42569fdf83942e6dc325c65", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_nbar_app.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "39c8705d35b5a8f472bd98d46377c323e4f8c50d4474693b433bedd089c7c41f", + "chksum_sha256": "2b1ce1e32ec0486a3aaed2e0110b432b58dd1409ceae1ec4686a00eff771114c", "format": 1 }, { "name": "plugins/modules/sgt_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d78fa36f0113492703b2b2b6bf07d29c71061f88d34b858d63e5dd34339953df", + "chksum_sha256": "39625699166c8a5ef6a7847951a338289995107068a507ff3fadfc3392f71395", "format": 1 }, { "name": "plugins/modules/mnt_session_by_ip_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7f799c4c4cef8ddcf807d3e5922960f430eda25e28345c7ec074ee4656c94723", + "chksum_sha256": "26cea499bea2703550f16836edc00bda73e43568883915ee84ea241cedfa0fbd", "format": 1 }, { "name": "plugins/modules/sg_mapping_deploy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2134c35001d99c368acbfce04094dab65ba6faa366699f8bd74de3dad86b0ed0", + "chksum_sha256": "cfdc27f93b4de8e932c0a9fd64bcbb3f44fc5f7e68f91e8851718680af258860", "format": 1 }, { "name": "plugins/modules/csr_export_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "81ce0b8bc7ffaf2b1c619f9f92153e56d42f99aa692b4e23cfb1d0e01f974063", + "chksum_sha256": "4c222e5e60eb643e121607ba219e39ed65ab2df91e2a93f252074a9bc736b7b4", "format": 1 }, { "name": "plugins/modules/trusted_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7333ee5ccff7132ff1eacb441338bfec8929c8ac62ef811edfcc037bb1f7dfc1", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "dac41c1c37fa7151c62fea48cd42b39aedaf5e96582df71ed780f7c1a533e249", + "chksum_sha256": "8122f76bf6346b714aa5503e3beaab91fb06a771ae82315fdbadf2f664883b38", "format": 1 }, { "name": "plugins/modules/filter_policy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "932c11efe2d1d891004c94de8f360387a63b22e2e4c85b01243ace004c466f6a", + "chksum_sha256": "776fcd99f707be4bdeaf66bb0621bb9cb7295d249c135e0fc4c85e59f9361713", "format": 1 }, { "name": "plugins/modules/network_access_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "362fad8d86a20511220441a6607db6d33417cfa2285a397d6f7721b21dcc5a24", + "chksum_sha256": "6963091d925e8f14277c0e017da5ba2923cac9a95588b9fd3bfa2f08884b42c8", "format": 1 }, { "name": "plugins/modules/pxgrid_endpoint_by_mac_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dc4bd937742bc1342c329f5b3ec174e54748ffdff0c147f43aa66e4d7206947f", + "chksum_sha256": "b43ba620feaecfc0443cd1c20a2955684aa22c777871c8bbb21529a1156fc5f4", "format": 1 }, { "name": "plugins/modules/radius_server_sequence.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0b18e493d0f06c5f0b9e7a9580727470b03ba72f9207eabbb2d48c6db2adb9df", + "chksum_sha256": "4009b312701993ebb7547211501f4ce87fdbd347b022b439970b896e734ea10a", "format": 1 }, { "name": "plugins/modules/device_administration_time_date_conditions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "53f7f1d8d605ec3f404745491255cc003d6fd69aebf7c65753196b1aefe4cbb5", + "chksum_sha256": "29850221d9e680f6ae463b47b2950c27d4c53151fef92029f6690065214ec6f0", "format": 1 }, { "name": "plugins/modules/node_services_profiler_probe_config_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6e1f4158e69573c7d05fbe3dea7e530cdc4d08a90b95cad34a21aebecd1545d5", + "chksum_sha256": "82d7d053ad481186e46a981eb1a1d48001c3a0f014633fe4c40dd9eaf0d5675e", "format": 1 }, { "name": "plugins/modules/pxgrid_sessions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9338f49012ddebef5f5d8ce0db92cc9e83f6074863483be819a68d5d454702e9", + "chksum_sha256": "d91b3a54f7cddeda8733304fc81554dcc007461196df950926d7bc3d26373e4b", "format": 1 }, { "name": "plugins/modules/allowed_protocols_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "927da67a40b901115bc90a399cbf26be5c9a19073e540d42b7487f6d13a49f16", + "chksum_sha256": "e7abcb03fc3ff329d890f4d08a400362d5265a0197edb2531e650e810d6c7e0a", "format": 1 }, { "name": "plugins/modules/sg_acl.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7e003a9ad3421c505a29a426d1873729c26e8a5640206bd4e238a00e120c0cf7", + "chksum_sha256": "b50d52db5a2d56665b884b52c233d1d9935df74258c8f4b74b019a8f4929ff4b", "format": 1 }, { "name": "plugins/modules/network_access_time_date_conditions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4d23ea2464dd5e64ad620c82ecffa4c5591c1f254b8102b04de62038aed50acc", + "chksum_sha256": "4e5e7b263490fd8129188741d92f478ef7a365133517bd43db464c448a4a68dc", "format": 1 }, { "name": "plugins/modules/mnt_session_posture_count_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d5b45afe7a1e32ed8da68e2b03efc186fc5270e454e9b32aaeffa2be4afe23cd", + "chksum_sha256": "e7ab7510580547456ab47e229b696b50e78fabc01df31ce3dc0a71c32b40e1fa", "format": 1 }, { "name": "plugins/modules/sg_to_vn_to_vlan_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d784681b0f71b7da8d6e2e892d310ebde6a12826b899c07070a0b95b34df05a", + "chksum_sha256": "16634c15df9a30b3297ab08b36c92ce03ae44fd11fc34ab2e77913adbd142fb0", "format": 1 }, { "name": "plugins/modules/profiler_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "acbd57df979e0b3907094707bcc38b7ea6d4b6262a7d8064441d95aab53ee9d8", + "chksum_sha256": "928d672be6b828d2a83c3c49dbaa21542255c1a59d7186ce3640996fc2e11a77", "format": 1 }, { "name": "plugins/modules/node_services_sxp_interfaces_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "18e95fdb713d452cf0125c872e2644a528f33228dee0347d8ed434479154d55a", + "chksum_sha256": "08f1727ebf79110d851dbe1f4e3e676bcaf579a8a7d4d0a157039a7949e26f81", "format": 1 }, { "name": "plugins/modules/active_directory.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eff7a97302c84388a526171caf65a18bd285146de518f1f6f58647800af298b6", + "chksum_sha256": "60f8354f4f55feea9a38372f83d86c4ec2ac29f63a67a2c402b68f7929addb88", "format": 1 }, { "name": "plugins/modules/identity_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c944a5af18b0b4561018132aacab9daeec4a3e068ff3beb88120e55885c598c4", + "chksum_sha256": "0ed4883cb6c36f789f4c5751c23ccb42bfa59d5a958c0934f136384f246b4b58", "format": 1 }, { "name": "plugins/modules/mnt_session_auth_list_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b30d9f7c076b3a6da68a9d1dd39e034d65381f598d6348a894a4e552d7b8ba94", + "chksum_sha256": "067df7408dadca42dc20f52efac9948264c57c77faf27b726b57847efdb7adb1", "format": 1 }, { - "name": "plugins/modules/patch_install.py", + "name": "plugins/modules/subscriber_bulk.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9bd05d13789cd92c8a0c4cd322b4e278f842f1e629c27b2cdbefe5bdd5a5cd9", + "chksum_sha256": "70a3ef2f608019f7f0f8c8c34fec3e5249d6b46fea8adc8191ec47e10c86c595", "format": 1 }, { - "name": "plugins/modules/network_device_group.py", + "name": "plugins/modules/patch_install.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c7edbe2012eddd8068caa07311aee812140185945f4c3a24c856309a6e9f4e5d", + "chksum_sha256": "f99520bf466f21469bbd60d167fa894a875b31aa5ad52e5139a45db3a1ce828c", "format": 1 }, { - "name": "plugins/modules/trustsec_vn_bulk_delete.py", + "name": "plugins/modules/network_device_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "47db6a3c9240c8e2b0f1a0873de6fcbbddc349ae0f174b8d21e3304b1b80a664", + "chksum_sha256": "934c9fefdd7d0e684791455f315f78d2bc5e82cde15a3c72ca5c8fb60c8ec082", "format": 1 }, { "name": "plugins/modules/network_access_authentication_rules_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "44f2bae93dd003607254644deccb669e9259438114cb2638fcc37c4720532601", + "chksum_sha256": "056e3ab2968b328dbb33ba1f39a6e1f26c824351774e6140581e5bdd8ab3b6f2", "format": 1 }, { "name": "plugins/modules/device_administration_authorization_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f4b24e9987051a94772e0a3eff9ae262dfefeab5552279cd66ca327faaf4dab5", + "chksum_sha256": "e5b3ed079b2b2648aa3ed9667df214f21a123b0cea278706b1d2b55903653dc1", "format": 1 }, { "name": "plugins/modules/tacacs_command_sets_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5b7530910181dc8bda5041f038e1900603904b1266531d6b455a55674160ff1e", - "format": 1 - }, - { - "name": "plugins/modules/trustsec_vn_bulk_update.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a9849daf062f7066061fce7e4a5a56294b2bfc84e6bb3e0d576fa259873f2322", + "chksum_sha256": "6078960ad6d221b7d90b7d1c3f7b42194e4b150d4190288242ea2af6445573f5", "format": 1 }, { "name": "plugins/modules/support_bundle_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d66289c9ed4e439291fcb70957d45d1f389f15747551edc7e6361151f36545b6", + "chksum_sha256": "d1676d8c7b2e873fe2e9a1cc71177d8ad46334e5030b245f9a961f3fe235f3b1", "format": 1 }, { "name": "plugins/modules/active_directory_leave_domain.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dbc82ca2e03b9f3eeeafe6ad0cc945b44252e2d6edbfdc1e70329419bae5c8d5", + "chksum_sha256": "9c172684a67855d31bb015f9791e44a37aa7c6958200c5ca92dd30ca12b49975", "format": 1 }, { "name": "plugins/modules/endpoint_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4b7b3b1508fec68a5354cecb1312a3d089febdbab113ce4a53acc7fe15a6e38a", + "chksum_sha256": "52663b0e052d8e99c6d88563115c3557a1f549a377b1703107a0bc878378fa8d", "format": 1 }, { "name": "plugins/modules/guest_user_change_sponsor_password.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8d43cd8f51592a27581172ec3d5cf3096cbe52077afeade3f47e081acb49fa9a", + "chksum_sha256": "8ce2b5a24d0096e497b6130fbb03f0c9ec813a53605d6c921474aa9e9b67ca12", "format": 1 }, { "name": "plugins/modules/network_access_authentication_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a8b226b3541020ed02bb2c0bc759f622a930006d7d68e7a7350ad33ace60e63d", + "chksum_sha256": "aed94f53f09a5f7d861d4482bece10dd484c4362a6a0f02829315f0fd1c72818", "format": 1 }, { "name": "plugins/modules/downloadable_acl_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d3bde433a205f2f3bd41e47233d881469523ab879bcaf934cb49f46716d4fc20", + "chksum_sha256": "140ba57c9d7b7f4f0a5b0ea1a51fa0008bc921d6513b0ab39a7622daa43771df", "format": 1 }, { "name": "plugins/modules/device_administration_conditions_for_authentication_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "501468609ccc0afcc04701a396eeba86f3eddc89a94a22416b816f2d6db7f2f3", + "chksum_sha256": "d480b64169c3027e837a91cb230f565246041fb282d7229f13d364f04118f01c", "format": 1 }, { "name": "plugins/modules/pxgrid_account_activate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "411f4c910ee124f83a642dfc23226005d91625882364166db5055b49cd12ec58", + "chksum_sha256": "c739ef48014d48c8f8c13d6c6508a4c4468083ba1c36d14548175c67ddac24f7", "format": 1 }, { "name": "plugins/modules/sg_to_vn_to_vlan.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3b020a13b5c1696d3e9a856cfd7e35bd21018c789f20e4b908b46adb34dda64", + "chksum_sha256": "b0be26d7e8114496c0975235ca07110a05e4b1ec928a646f8949b5790f2bd3bf", "format": 1 }, { "name": "plugins/modules/network_device_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a48033fffccafb3f7e9fb26459aa1fe2ad76cd0a27609078f46d86fca5da8a9a", + "chksum_sha256": "de59f2824111470884b277f2adee0b3192623514426558fed5a640ad533bed4f", "format": 1 }, { "name": "plugins/modules/device_administration_authentication_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3084578eac40b19f0ced3e70fccbe9a24a78598f4a8997391e34048325c82df7", + "chksum_sha256": "aad476fd584a0cbbb9e5da60c648e07d19384e111863f323d14ba3915750b844", "format": 1 }, { "name": "plugins/modules/csr_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7cecb84e4f6da3cec42076435407259d3707a2e2b293abf2cd3ff6ed52e66d12", + "chksum_sha256": "c8cd0a19db8c2ff90701470eaec2c40eac41fd7e6a1890802aa743e4adaf8317", "format": 1 }, { "name": "plugins/modules/authorization_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "27c828e09bbc869e5ae2ecf7127a9577b18ff2eb703255038f3d59bcc438850a", + "chksum_sha256": "7f7c133399f06a9a77d4d855195333a9ad9f482c91b1ed12f7715c477316b35f", "format": 1 }, { "name": "plugins/modules/sgt.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c8908c34312edaef6904236e773ce36be9f8272b9a30cb6e7d6fb8ff569bc123", + "chksum_sha256": "11990c1d407ad61e77dafa8ddcc1a173c8039a2abb41f30189f0dde0c54ba6ec", "format": 1 }, { "name": "plugins/modules/patch_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8655f5ebc046fcdeda8cb2376a9206bef270fd1504e960e0121f516c1dcbb19", + "chksum_sha256": "a0b11e871bfa667c3c162c3e685d0abef3c0ec7bf844bfe2274278dee8123698", "format": 1 }, { "name": "plugins/modules/device_administration_service_names_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "221d7969d00121e74624b83f6f5fad460553ffc0dbf5de0da99f40a1d8a2410c", + "chksum_sha256": "fd08d6d64c3a1e845cf0c4f12f6965d9c20addec0fc30c3240877e9ddcb98fbf", "format": 1 }, { "name": "plugins/modules/mnt_session_delete_all.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c75e9e6c9d210a747779efb2d7fa118980959f84a94a1de257c3f47c9075376e", + "chksum_sha256": "5efd226d77f42f8b8aba5dd2384ff129961c2b9ed6ecded473725d29245779a9", "format": 1 }, { "name": "plugins/modules/px_grid_settings_auto_approve.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0209d9dd92eef1007ace5cba1e463cba630a3617c22b7b469dec0d91fd02dfd1", + "chksum_sha256": "0143c9da5cc4178d9960b3fc8ac7e683e53573eb8e08a506b464fac48aa77c21", + "format": 1 + }, + { + "name": "plugins/modules/connector_config.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9e44ac4997b4bdcb9567bdeba890e619a3e794801a89eca2bb4ac71b81ab9206", "format": 1 }, { "name": "plugins/modules/endpoint_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "448e3e2f994e3e7eeecf28f6abeba24642b868185c24aae878808b65bb9df0fb", + "chksum_sha256": "ac2ee91691d27021b47ea49c39b34865b50917d0a30750d651db0341139d3928", "format": 1 }, { "name": "plugins/modules/network_access_authorization_rules.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a197a0f6a544d5725b21261b104b8cc448c995364fba1c7ab3bedd0b3e4bfda9", + "chksum_sha256": "81f196ad4a4027c1a2d9514d92b5459ac2afe68292e5fa28747ab0aab23a932a", "format": 1 }, { "name": "plugins/modules/mnt_athentication_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea64724f0d88cee1ff56e59b723d5cd6c0b8c813e3d676988875bb8c55c733d1", + "chksum_sha256": "135f75ff102f2cfc50870846320bec461beb3bfda1f0a68acf2b856cbea4ce91", + "format": 1 + }, + { + "name": "plugins/modules/dataconnect_settings_status.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9e785130c64b7bfda6ec5d0d5916ff1894dfec94406f07c1ec99e82118bdfc04", "format": 1 }, { "name": "plugins/modules/device_administration_conditions.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5337a1f058249918fc2759af23816d0fb545382d7e94ceab561841f1239265fe", + "chksum_sha256": "affd4a8462b694bc6073efa52ec4aee7153864b5f9d9a4c2d43c978d5e11d639", "format": 1 }, { "name": "plugins/modules/sxp_vpns.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0177b49c9dc5ceade8e35449542063bc7c95fb4a035ddd0fd0791c804dc95416", + "chksum_sha256": "886f4337df0e82da7c94965276eed8638535fa4a3585b97c21afb8f386110963", "format": 1 }, { "name": "plugins/modules/device_administration_local_exception_rules_reset_hitcount.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4d40cd090d546b370a2b8e26ac654a65c2c1aa1d705ad936f0016e9d6d5b60cd", + "chksum_sha256": "8b5a1a060008f3d62d51a6461b940471fccf67fd1214f665684d8c131a277ad2", "format": 1 }, { "name": "plugins/modules/resource_version_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31ec92a69419ad7c7bffa0adf6744cc5e0fda39acb78e5c8f7fd27419022fada", + "chksum_sha256": "8cfbf5996672a5cceee6c0cbd8b3855808ddc8982304bc05b87157d0ae8972a4", "format": 1 }, { "name": "plugins/modules/renew_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cecd408ba7136fbcee5687ff73ce014c004ab5ffd5031b7ed3bf5159816a5ceb", + "chksum_sha256": "9138ed3377ab770a024a0565d6d56806e31438a3e00bc4ec8c1d61c598424c54", "format": 1 }, { "name": "plugins/modules/endpoint_release_rejected_endpoint.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "88892b97fe09e218ffd880844de89060bcd2dd9803ddec805aa90bd548f8a9b1", + "chksum_sha256": "76446a579f2f0c2a848d537db6a18d30d9a2e423604a60955118e0607dd5d002", "format": 1 }, { "name": "plugins/modules/guest_user_reinstate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "50f30ea916efa32df61afa0b43befe129744298dfbef0a5eba5567c449fd140e", + "chksum_sha256": "4c59aa7e1d3108236a62c497bb5ccb392f92ac2b39ea313a86ad738aedbebccf", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell_clone.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "61508bfbb55c9afca0ae27d5bf978cf7dea4795fe4949a605808cfce27e8ed19", + "chksum_sha256": "5c76778fb1db86873357e41b7111e0ffc67d5145c1a647cb1ebe407be2d7fd13", "format": 1 }, { "name": "plugins/modules/my_device_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c56674fb9d310e54dc4a99d35492b34a88279a9331547c9a94f7c8dd3f8fc65", + "chksum_sha256": "dc58e7e8538e3bbc28dbabdf8f8a1de1d5ddc63ad6353668fd6bbbde18ad811e", "format": 1 }, { "name": "plugins/modules/network_access_conditions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d5eea49dedb6f001563775ef48f0a505382293f93bfb61902b631062b24a084d", + "chksum_sha256": "0dc6bf0621f8e0edbde010726f7adb641d9e9f544d7c2a7a71b58a2196a8b12b", "format": 1 }, { "name": "plugins/modules/pan_ha_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bb1831837261f2bbcad0ac2ba1fd33f9ea63c999634ae0048961a92def30de5d", + "chksum_sha256": "2a5e12e67ea4100d862876a1a20c1d7a8bc4834a34c98f14d28ebd41fc233dc9", "format": 1 }, { "name": "plugins/modules/pxgrid_user_group_by_username_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7f525e41b5f546c676c64c1ad876d61ac65cbd5619f9594d76b1c52bd4aa03ed", + "chksum_sha256": "b7173618a4c649ba56ca8878371c596350964dc5cf80da2e564ba0846e974c70", "format": 1 }, { "name": "plugins/modules/node_deployment.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4fa60c1838da98004c1965853fe8dd168a8ce07c5d91fb9df8987be28204c735", + "chksum_sha256": "e5c430ca6107d1a0c4e473bc2ec7ee2afd9fcd0d3fd1e532496fe10e2ea967aa", "format": 1 }, { "name": "plugins/modules/certificate_template_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a870b5f613f3f3c807ad7089264a60ba77a23771209940b5998b5b288653583c", + "chksum_sha256": "53aac7e9e6cac4e68448da17e9e1492842685deb6ff3f864af87d583093b7912", "format": 1 }, { "name": "plugins/modules/tacacs_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d7001cc7b3fb9fff0aaeb207ad3783505a7685c1d8824146cae67c4563efc33", + "chksum_sha256": "3e504ef810dd3090fbcd437cebbfc7f0e00e77b165400d8a8e4bb7323221d12b", "format": 1 }, { "name": "plugins/modules/sg_mapping_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fb7429ce1099f1780f882205ea46b2f08a76259121f215b2774cb71c8e2589a4", + "chksum_sha256": "2086f5e45421eef6a31fef68f51d695f766730072a9b0cb9ee72b6b8ba5bc921", "format": 1 }, { "name": "plugins/modules/sxp_connections_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be96d909d67c7955ef86e9d86c3dc4f7ce3e33a10262395c12b8fcbb10f3835f", + "chksum_sha256": "d4c68238dec1af718271b3d5306ea000197c632d4821032c9a7c8e55b3770d46", "format": 1 }, { "name": "plugins/modules/pxgrid_service_unregister.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "039d61a71d5426f6703df8ae82dce4f771351363e0d57eb7572a485b46f37dd2", + "chksum_sha256": "ac3fb44bf0da59bab2563ecf232edfeb9f1ddab9776733d1790859c292d4d09c", "format": 1 }, { "name": "plugins/modules/byod_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "18c52e0ecbd43fdaf5fa6ddac70256471f51f538751486300f681cf8837f8d6a", + "chksum_sha256": "850da29937bdddd65d1537819a6bb1b4a24dbbe9a22a656a6ffcf7dcb16b6c1c", "format": 1 }, { "name": "plugins/modules/sg_to_vn_to_vlan_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e6ad766d005a34a955c949f17bc6cd2e93cf1323b261cfc87ca95ef88713fb9b", + "chksum_sha256": "5149b51f0543e13cd156db9f7a5e348d9e2fb93fb8f667cb7b0dbc51b5e40681", "format": 1 }, { "name": "plugins/modules/active_directory_trusted_domains_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3835c14e30792495f69bd69500f303eed96abc091ef67d7e68d0481c14790fe", + "chksum_sha256": "44e49c7bc5161cba9d58a3369c1280603e9f930f4ce43d89b3b2134c2300f780", "format": 1 }, { "name": "plugins/modules/pxgrid_authorization.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "88dda74e16ab3354c7a8b68134bb03fad8b1983efdaa8b71183d6deb9b662613", + "chksum_sha256": "716cbb731974d0a0ccf91ce064d71def0da5c4d69d0b676d7e44b5c014408eb6", "format": 1 }, { "name": "plugins/modules/licensing_smart_state_create.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "683cd1e8f079e4fd5471af14ef215dea8d260b80b42ee37d635a79feabb57b1b", + "chksum_sha256": "13c2bda14a972d7be86ef90bd61e0c8bd56f7374866f515859bbc003d2d5cdee", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d514139cfc7a0e7feb2ad58b71c74c286c92f6c32ced9c5630bfd6cceb9f1d09", + "chksum_sha256": "5a365c7a7d2f0b706a63d649acb7807b8c58c06b2f61538c96e27894ac861832", "format": 1 }, { "name": "plugins/modules/sg_mapping_deploy_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8d8b95e136c0b1ce5dae49035771e6b850000644686862b5cd92d3430050d32f", + "chksum_sha256": "c082f7ba3c2356f15b80b7fd8b0ba8f25093b07815e8a33dea1703616a5127aa", "format": 1 }, { "name": "plugins/modules/sxp_vpns_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ab9beeb323d726775782016e83a87c8949136a5db63528cbbc9ab05d0133e8db", + "chksum_sha256": "961ef697ad94b8234c501b39c29b4c4cfeedeb506dd26c2deaccfa843f4561d9", "format": 1 }, { "name": "plugins/modules/device_administration_command_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "370d9955690f80e2dbb22388bc1fe82cf57d303bccee8e46d7b569342f275f02", + "chksum_sha256": "abfd39aea65d01234aeb547e3b1116eb9e3cc2937fc6352699ec6368836f0c32", "format": 1 }, { "name": "plugins/modules/sg_mapping_group_deploy_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c3b8c8c6044c74f8780f0a54758ed69e4cc55525e98e8df4a75f7b771908b15c", + "chksum_sha256": "20f33dc8990466d7672f50a8b0f7a20f2e20f144828bfc525c3db0454b5fd855", "format": 1 }, { "name": "plugins/modules/repository.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b716e775664335f54bed58577e051d89be8cd80a40e6ccfb9de529e1361ccf5", + "chksum_sha256": "0ffa9ec0cacc42ccf95c6220b57e34e6d63a3c9e563e3199b92b7a4ddbd58e7a", "format": 1 }, { "name": "plugins/modules/guest_user_suspend.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "19bfc4f3c8ac892c63e83415d6eb02e4dab8dd1da1c3d1e9785c451234367c68", + "chksum_sha256": "b79b5d16c3b66c3554577c2af772736f964e81bae3a5c4cce2233fb856f4396b", "format": 1 }, { "name": "plugins/modules/network_access_local_exception_rules_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e921ee75377931f9bc379453f90924507c0d63a41675c70551f0069816cb6ff1", + "chksum_sha256": "51f3ca86580facf658cf1abec964895a4043a4e1f5d207a54f9623cdde7f3431", "format": 1 }, { "name": "plugins/modules/endpoint_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "52c17aeccc655691ddedfea82fb23ab0677ce2410668cf9e8420064e1684ac80", + "chksum_sha256": "7fab9f7da635106f2a36d21ba7d1f6ac79693166f3453b50a4b9f4bb29b0bb38", "format": 1 }, { "name": "plugins/modules/device_administration_dictionary_attributes_authorization_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9d175eb83c50464bb8e80037175e68f5da105fdc802eaca4e8ca38582c82a396", + "chksum_sha256": "07cf2f446be9ca3f8ddec70f6fb4f1ea5996c3c021fbb12f342aa2e9a400fbdc", "format": 1 }, { "name": "plugins/modules/transport_gateway_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "29ea7e916d3bad76f0224a7e2ef3235e885bac76514ca67e441a9bf325c0bca9", + "chksum_sha256": "24ad7f493db1ce466405b348ee57cb7b97ad40f12810340c89f8612ac61e5d8e", "format": 1 }, { "name": "plugins/modules/backup_cancel.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "20bc1c12edc8c3489b1f6c8d52c967625b003cfa0eb092c5ae546db8d2d7f045", + "chksum_sha256": "8b42e4d9b7f8dd07571306c1fae0cf89491307672d07b482f8d4b0355843d03b", "format": 1 }, { "name": "plugins/modules/system_certificate_export_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e31a2404e4034b042fda707fcf6e7c1144ada90f40dc5d49e39aca09ff712b2", + "chksum_sha256": "1c01f01b4a086d90244e0ba5ce9348133e88c31f430b01d5b54de5cc5b4b13d2", "format": 1 }, { "name": "plugins/modules/guest_smtp_notification_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dee302980885a67555190e0a2df39f31426d4717ef324438c9fbefd186f7ea7", + "chksum_sha256": "0305e409cb1ebd535dc7eedeaf444ba65352b9a5cbb17668a2bb136495bac526", "format": 1 }, { "name": "plugins/modules/network_access_profiles_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2f7f18adeb942c2957d3d60d0bb26e2561051ce618adcaeca00b9b27c02b1dae", + "chksum_sha256": "a3c11c1dc47edb236e5f5052c50d822cb84a2acaa2518089493c50b51deb8151", "format": 1 }, { "name": "plugins/modules/active_directory_add_groups.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "89f59acebc586c44d3cbebbc5421cf6b9b69ac680b6bd5b2de340485a7da3817", + "chksum_sha256": "4e09e04050499f616733bdb2101d8addb5ac566a31c4b295763180e4430b5bb2", "format": 1 }, { "name": "plugins/modules/mnt_session_active_list_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4ec32000f0e6d42e8eef5b839b83182e17f9309c9a2e6c78561222232ef0e27d", + "chksum_sha256": "1eb5965437fdc4341e192c2ead750e303c95978af102fa36e592a7f19a73416d", "format": 1 }, { "name": "plugins/modules/anc_endpoint_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0272e411560e5411f644981e6cfd89126128d46c93ba0b41f627240d6a49fe6a", + "chksum_sha256": "7a3569d21abf2efc954fc28bae550fa3785f1422afa361eef6cb3a9ae29b1e37", "format": 1 }, { "name": "plugins/modules/guest_type.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a2b702d81bfdbef4ec6b945596cb5b5bff75e121e08d12e9463266be7c55396", + "chksum_sha256": "76559dbf5d0dd9789aafc54c94da8a6de33c526b58d7eff513a66ef39719a703", "format": 1 }, { "name": "plugins/modules/active_directory_groups_by_domain_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "93ddeef12d6d2669d00c13b7762e73c96ea61ccaa44d67afff751a46c6299908", + "chksum_sha256": "0eac95f6f75c1fde3207ac1ee8514e5c2052951cc6d912c5234775e844540a49", "format": 1 }, { "name": "plugins/modules/network_device.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ec3f770d649227d7bd4c0952c73e22b637ee07ba93420505df3943b3fb4f1cdc", + "chksum_sha256": "f991f5c35be49f5d6fcbc0bd697d4e026fc446a75ca8623be0b709318156ec69", "format": 1 }, { "name": "plugins/modules/network_access_conditions_for_policy_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d29e3b7dcc7a1d877a7aba05f71c9e92bc0719d6c33be146325c10f0d8728432", + "chksum_sha256": "0d5430c7a05800cb2d57d78ca3481ca0fef6734cebc64080ae973fe04cbbd75e", "format": 1 }, { "name": "plugins/modules/tacacs_external_servers_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c94bb5f2e9e31c7f58749e8cabcf3fd6146d16c95c39e53652142ee058c11307", + "chksum_sha256": "cb879f487ea6f18b672115e75eec0ae4fe4026ddc86f13421bcdea7c1ad3fadb", "format": 1 }, { "name": "plugins/modules/active_directory_join_domain_with_all_nodes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1e964a0773a88079a397484f50edec834aeec9da05020565e58b4beeff28249a", + "chksum_sha256": "14b06a4ef10b9b2584e8f532fe1c37677b72fad9c239990b2d50b29502f7e6e7", "format": 1 }, { "name": "plugins/modules/pxgrid_service_reregister.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d967ed3ca37ea997a0d5547776dec446abf219e08de3ecf6251d5e052425d0ab", + "chksum_sha256": "ac9855f6d676e6f9300c1993cf53fe6728cfb0eebd08ee2f6bd12a8cb0d09eef", "format": 1 }, { "name": "plugins/modules/device_administration_policy_set.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8047ab01c7b34fd6d450f0539dfdd4c9e51d3bfc9bb1bb3990c44e18a3341f93", + "chksum_sha256": "b1e339b78bc4a644f0b989808b9e32c74d5dcfec162b97dbb0063f0e0058a111", "format": 1 }, { "name": "plugins/modules/hotpatch_rollback.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "01011f6358c0040ddf3410378cc39750bb9fc57b53ed38bff552c8dc2fb943b0", + "chksum_sha256": "5bbebb8f1ed74a0d02feab93c65ef1e318512ca91a3439d68a6ff4a95ee7301b", "format": 1 }, { "name": "plugins/modules/pxgrid_service_lookup.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1c163f4ff7ea6c88d071a18a9be2685209ea72a16a8910150285a4971f9ed60", + "chksum_sha256": "eb23143fd6f111fce408ac8d4e75dac145de82006d52dd37a96ed1ffa05e6e96", "format": 1 }, { "name": "plugins/modules/portal_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "75d247a8da396dc7ba4538b7e17929d019facdc14402a36257b6ffefdb63243e", + "chksum_sha256": "86ab7bb424a1c6a4f41c41bd6d7ad204ff661388f684b774af1b49076ee4f846", "format": 1 }, { "name": "plugins/modules/anc_policy_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ca619737532329676162af6d79e2c65e3f87f25fc3c6bd2aa962d59ffececbb2", + "chksum_sha256": "e2db248923a20de099bd0a08ca6005fee8ff8c6d9d86834eebaa3fa3f58b4b6e", "format": 1 }, { "name": "plugins/modules/network_access_local_exception_rules_reset_hitcounts.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d84b499c5401da5cfe0e3f1e3e5c89e674e3335d6f514496cd145b0d97a9b6f", + "chksum_sha256": "d77f9887d2c25f06a3b45201865727e8a145ff2d9aafa2be1f1f760acb5382ba", "format": 1 }, { "name": "plugins/modules/device_administration_profiles_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d9f5bc044f10473afeb114d9bd1157014211cb649710c7e372e413ee6585cf79", + "chksum_sha256": "76c1ca1262737ffd4d0ed1c5e3602402de168d0b3e79e06f9981683771a8ecc7", "format": 1 }, { "name": "plugins/modules/hotspot_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd6ece9741e6c0e854ed33c59c93a69e74e187238e00075b1a81ee3f8ba88f0c", + "chksum_sha256": "348aff0535f872fac8d9513354f67ee2ca67f84ff42b7052ba1b11abe2e1d536", "format": 1 }, { "name": "plugins/modules/backup_config.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb15b17f8a16f40fdddb60e50b87b0eb26417c85f55ff37d016d4757e1e79680", + "chksum_sha256": "7b9ba95bfe05869c4f2ebb1576313c3e277c669686059b9f246fb72c27043a14", "format": 1 }, { "name": "plugins/modules/sponsor_group_member_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d48df234eb72a4d2d97e86db2302580190637f6c5d4bdb962d8faea35a88e094", + "chksum_sha256": "aefdc19a57de8b900e577a79b07583c669c19ec64c4c974f80cd1078e6d4d0e0", "format": 1 }, { "name": "plugins/modules/native_supplicant_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "448af9195e3c4adb4e01f17242e0fa57594f5d111b3610881d64f740e9f3ecf1", + "chksum_sha256": "ebe468677f8aecc2f3f0b8cd6eda96438228698d3504d992da990bf50d466531", "format": 1 }, { "name": "plugins/modules/network_device_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "aa086c6958f8232ae0be9716b57783a76a052c2e5f519daa933f122f8747bea5", + "chksum_sha256": "2c5f83d40eebe3d0b1db590f20726ade3589910fd444f1de8d6e56afd2466f04", "format": 1 }, { "name": "plugins/modules/egress_matrix_cell.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "428b022d98735da70ce7cefe9c9ea4915094afef7514c6e3300273a5c9c5a3e0", + "chksum_sha256": "168dfa04224c2f353fb93ab9d238d43d5ac8f38dede8a70a8fbdac5cda5c6a63", "format": 1 }, { "name": "plugins/modules/self_registered_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "23f518cbe499fadbaedc4ec076b6f4e3010fdfc65c9ecbefc49d21f27700782d", + "chksum_sha256": "c7002e1b65e71ac66cff428c5bc948675cf580925400216659331f2156983c80", "format": 1 }, { "name": "plugins/modules/pxgrid_endpoints_by_type_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8c2b1765cf40fab9631b04df4e32ad311300c06d18ba912ae1bb48e454d495c7", + "chksum_sha256": "6c19e5636d12ae13395165460aaad23d8462fa70158fecf4e9b8c91d8e9f4d17", "format": 1 }, { "name": "plugins/modules/selfsigned_certificate_generate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "97f5d187ea54aa2303e648af6e322161a8419e748121f17bfc01bbadf2295041", + "chksum_sha256": "546a291033d01ea28bb968967a462868266c089a876bf60fb2a445f0542ba2d5", "format": 1 }, { - "name": "plugins/modules/trustsec_vn_vlan_mapping_info.py", + "name": "plugins/modules/external_radius_server.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ff266c8661f5a0b1d3b2b57de9b7060b644f371a21b72ab2040d125f479a4f65", + "chksum_sha256": "746b442891b8a9acb1a5bc67b8d2f3ad1b5e27acc2c7fd9f5565b62300d2ac99", "format": 1 }, { - "name": "plugins/modules/external_radius_server.py", + "name": "plugins/modules/dataconnect_settings_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4cde6c1650f69d40f83683aed831809d654a33fd3214fa67e8a39a4b2e83782a", + "chksum_sha256": "890c65c102b37b0306294437f5b1a85973a3a330eb7fc22481799790ea046717", "format": 1 }, { "name": "plugins/modules/pxgrid_security_groups_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "081722cf7e1b11470d8f2be3e8e48c8319dfeaf5f87ea2da94ca37645eb77008", + "chksum_sha256": "0d1a4531df2dac597cd9b30a29263981f527ad353c2eb13294eb2f1999cada56", "format": 1 }, { "name": "plugins/modules/internal_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6a9d67b9d0356e43f9105d7a646a9eb0c826ce25c3397e99a25719ad72849600", + "chksum_sha256": "05a0e8ebb98b6f10b43c4b2b4e359743d3489742ff8aa2ee1c926e3edd105bf3", "format": 1 }, { "name": "plugins/modules/sponsor_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6751b7af97c401b83a7f0e7fd7f77c2edac3c2a72b2866f6f583fbb5f10db18b", + "chksum_sha256": "1d4c4ee1b8aeb96c42bb0a6ed06e8ed37e6a212fba4ff788f177918cea7a9c91", "format": 1 }, { "name": "plugins/modules/radius_server_sequence_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6409113af7d415908c11db9fd91699616ecb1768224b5c920ecca58c74fd624b", + "chksum_sha256": "619ad9d219c78d01a45f712cda378b8ff15945f1d04648c0880feda6e3cd1294", "format": 1 }, { "name": "plugins/modules/node_deployment_sync.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e1b08a526d333babe847944fc000695f6f5ab41f00c414869cbdc158cf2c38c", + "chksum_sha256": "64a68a165c75c49095fc1677f6319e5353a976870987d806eadb4b4872e0cf52", "format": 1 }, { "name": "plugins/modules/sponsored_guest_portal.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "093abb41f405ed5f77279d0d3f121a6bf27b3cf8fd4e8f97b2e354a86a0e2f79", + "chksum_sha256": "e4885db2669c90cd436784c60a5f69733c3b7208f605405444d00b7f9ff683a7", "format": 1 }, { "name": "plugins/modules/guest_type_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "24dc53431a2f72d97b31cee9f4faac943b035fad3739626e34fe60f3b8712d1d", + "chksum_sha256": "31174879c6d1341232fbcaf1e136a18396806b4d80be0e077edcdba639f086bb", "format": 1 }, { "name": "plugins/modules/sgt_bulk_request.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b19f7bd1321d67b2a582d188160040a6ff511c2e7d57e027f1c674f8447c3df", + "chksum_sha256": "42bf28049da1e968e93c15b189af60fabca2d78bc20be0a931e8b051647a3f94", "format": 1 }, { "name": "plugins/modules/sg_mapping_bulk_monitor_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "342e577ca90146213574f8e2834a43184995eed4cca12131e94b36636086de5e", + "chksum_sha256": "45dab621404676dc54ca5934ad34b2fd7ba3f876f5f47911c580eccacdaba8df", "format": 1 }, { @@ -5503,17 +5482,24 @@ "format": 1 }, { + "name": "tests/sanity/ignore-2.15.txt", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "format": 1 + }, + { "name": "tests/sanity/ignore-2.11.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd8f3ff55472e7b574eaf8756c59af81ec80a34d28924df54b2f34e406167bd7", + "chksum_sha256": "0957ef3a6de933fc4aa49da7fa60ed27e12eb10744ad51b0478b011b79e963df", "format": 1 }, { "name": "tests/sanity/ignore-2.10.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87293a1c8b352044abc86210d8cb127919b19df18a469a10a1d1b0192f3ebcd1", + "chksum_sha256": "9a1231b15ebf55e6bd11c60aecf329f2583091ad6c2257976b5aeb27c5fe916e", "format": 1 }, { @@ -5527,7 +5513,7 @@ "name": "tests/sanity/ignore-2.9.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87293a1c8b352044abc86210d8cb127919b19df18a469a10a1d1b0192f3ebcd1", + "chksum_sha256": "9a1231b15ebf55e6bd11c60aecf329f2583091ad6c2257976b5aeb27c5fe916e", "format": 1 }, { @@ -5541,7 +5527,7 @@ "name": "meta/runtime.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "48a2f61c72296aaa190a3ad670b0a5759bd047262b59b3d870e986b05878d87d", + "chksum_sha256": "2e182a22d58fcfbca71fbef1992147e1cd87fc67648750e62b5955ec72521520", "format": 1 }, { @@ -5793,14 +5779,7 @@ "name": "playbooks/network_access_network_condition.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "902668b9f32f319dd0b733ede237147a0f87bf8fe698ac76c21b4b09a3603c32", - "format": 1 - }, - { - "name": "playbooks/b.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "dfac4a43c6215b9992ede57c2c9ed3eff9a8a4caed82b91d82ada45904d0c641", + "chksum_sha256": "b1f9ef2210fea578e07c1c9cee10acdd4f77760dddd054b426c7adf1bdb80098", "format": 1 }, { @@ -5856,7 +5835,7 @@ "name": "playbooks/group_vars/ise_servers", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "aef6f55ee40f79465794ebf4c49a75b4fdabb1e4145e9d25e1c8a6fa2f837bcc", + "chksum_sha256": "9ac69d55205ddcdb3a2084acb395f4ea26e195b233b37a5fbb01767aff48ce85", "format": 1 }, { @@ -5909,13 +5888,6 @@ "format": 1 }, { - "name": "playbooks/playbookstest.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "519c2bdd245267c841eb1690740f23b57db59cec5ccf4f36d56f8208eae7c381", - "format": 1 - }, - { "name": "playbooks/csr_export.yml", "ftype": "file", "chksum_type": "sha256", @@ -5940,7 +5912,7 @@ "name": "playbooks/network_access_authorization_rules.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0b718f75b4b3ae3991562378a7de2a0a905fdc155bc6d18c621be4daf1796ebc", + "chksum_sha256": "d549cc23546d53bb89a2c60c62ee1d59e3d72af4eefd8826cd2237a1bc6307a9", "format": 1 }, { @@ -5993,13 +5965,6 @@ "format": 1 }, { - "name": "playbooks/azure_deployment.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "95900aeaa31044ee6f5d0f26f108074f26e8aef4dc56f9b09ddac9cfbc75aca4", - "format": 1 - }, - { "name": "playbooks/allowed_protocols.yml", "ftype": "file", "chksum_type": "sha256", @@ -6066,7 +6031,7 @@ "name": "playbooks/aws_deployment.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0c4ea3c151b05dc4f33a1ef2192a8414a3017b2b46b6474773afada482bde734", + "chksum_sha256": "cc97211ae36f89386a5372975d7e0d8b13291d71d462b2b7499689a19bfbdcb5", "format": 1 }, { @@ -6077,13 +6042,6 @@ "format": 1 }, { - "name": "playbooks/credentials.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a41d01f20875f571a9e1a2502879da3acd618801085ba61d5c809f0facb0a6ba", - "format": 1 - }, - { "name": "playbooks/network_access_authentication_rules.yml", "ftype": "file", "chksum_type": "sha256", @@ -6129,7 +6087,7 @@ "name": "playbooks/network_device.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3cd35f0f78abe30eaa95d27638a301760cc394ff88807c56d1afe6d1b5556cb", + "chksum_sha256": "4326ac60f93964ce22281cadbe0b952c8c6142bd9c6d8f9021233a77acad0eae", "format": 1 }, { @@ -6157,7 +6115,7 @@ "name": "playbooks/hosts", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3831686ce8b3b790ed5e77211eeb02bac1a6ab9bfccbb7c2ee8f94fb25ed5410", + "chksum_sha256": "58455c816186626e36f39ad71466d285cc9649cfc05f8fd1fed470777d02a8a8", "format": 1 }, { @@ -6189,13 +6147,6 @@ "format": 1 }, { - "name": "playbooks/profiler-services.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8dc6ac1e8fb08cd3b641af14786261da25b85d6fa002895dac86dbc7d4f9f247", - "format": 1 - }, - { "name": "playbooks/device_administration_authentication_rules.yml", "ftype": "file", "chksum_type": "sha256", @@ -6234,7 +6185,7 @@ "name": "playbooks/credentials.template", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c58d7a9ce7db850d4e382275f2504e9ce777b2355493aed04034e07f385bc594", + "chksum_sha256": "b5db043788f88104f89c0273aece227d6c4fc9cbe1a1ac0d993bc81763b958bd", "format": 1 }, { @@ -6276,7 +6227,7 @@ "name": "docs/conf.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "11c3f508b7f7472dd6aed3df9a989bb299114020c6a9b5bd451270d89f51e7cd", + "chksum_sha256": "98701ee406dc6461c7733aa12f22d2d8b4ba3036735a51f1c532476a3a9ea284", "format": 1 }, { @@ -6318,14 +6269,14 @@ "name": "changelogs/changelog.yaml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "641d15f1a652ed2f9fff6e80be25bcdc1667fa74913184d89d3617ed55f03119", + "chksum_sha256": "1193073224fb370f3d397b81858a7bda59568a510fa6c8e925f2b29479326d20", "format": 1 }, { "name": "README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6c61f4c1df719abe5ad978ed29ef55403e10e8e1483d28a36ec0e09bf1be3e26", + "chksum_sha256": "e0770ec263df253ef1ee1b8f727e1e03c18f8c1198efbd85d7ed1c63006b3b4a", "format": 1 }, { @@ -6353,7 +6304,7 @@ "name": ".github/workflows/sanity_tests.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b187bd09d1863a610a4ffa47ff3976c4686c01fc39d547fd7b844aea1a4d592a", + "chksum_sha256": "dadf3d50392de4f33e091cf5947f4cf8f4ba153a95b63026e6d8eae8214ebd69", "format": 1 }, { @@ -6392,13 +6343,6 @@ "format": 1 }, { - "name": "hosts", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3831686ce8b3b790ed5e77211eeb02bac1a6ab9bfccbb7c2ee8f94fb25ed5410", - "format": 1 - }, - { "name": ".vscode", "ftype": "dir", "chksum_type": null, @@ -6409,7 +6353,7 @@ "name": ".vscode/settings.json", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1", + "chksum_sha256": "ff058b88424cd36c92374f3465470d0c24191746d224d3729d623881464c651e", "format": 1 }, { diff --git a/ansible_collections/cisco/ise/MANIFEST.json b/ansible_collections/cisco/ise/MANIFEST.json index 030ef2e86..81f5e1e9f 100644 --- a/ansible_collections/cisco/ise/MANIFEST.json +++ b/ansible_collections/cisco/ise/MANIFEST.json @@ -2,7 +2,7 @@ "collection_info": { "namespace": "cisco", "name": "ise", - "version": "2.5.12", + "version": "2.8.0", "authors": [ "Rafael Campos <rcampos@altus.cr>", "William Astorga <wastorga@altus.cr>", @@ -21,7 +21,7 @@ "license": [], "license_file": "LICENSE", "dependencies": { - "ansible.utils": ">=2.0.0,<3.0" + "ansible.utils": ">=2.0.0,<4.0" }, "repository": "https://github.com/CiscoISE/ansible-ise", "documentation": "https://ciscoise.github.io/ansible-ise/", @@ -32,7 +32,7 @@ "name": "FILES.json", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "47d1392f23cc9333d6ad73d356e9094757167b3bbfc78e961a70849cafc42752", + "chksum_sha256": "43d93ef4489b0ae7fbc8e57931e7dece5b2d87c9e3cdbae66359cce957ce2875", "format": 1 }, "format": 1 diff --git a/ansible_collections/cisco/ise/README.md b/ansible_collections/cisco/ise/README.md index f3278584f..a6471334e 100644 --- a/ansible_collections/cisco/ise/README.md +++ b/ansible_collections/cisco/ise/README.md @@ -39,7 +39,7 @@ This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enab ### Using the collection on previous Cisco ISE versions -As stated before, the collection has been tested and supports Cisco ISE 3.1_Patch_1. +As stated before, the collection has been tested and supports Cisco ISE 3.2_beta. It may work with Cisco ISE version 3.0, but it is not officially supported. @@ -50,7 +50,8 @@ The following table shows the supported versions. | Cisco ISE version | Ansible "cisco.ise" version | Python "ciscoisesdk" version | |-------------------|------------------------------|------------------------------| | 3.1.0 | 2.0.0 | 1.2.0 | -| 3.1_Patch_1 | 2.5.12 | 2.0.8 | +| 3.1_Patch_1 | 2.5.16 | 2.0.10 | +| 3.2_beta | 2.8.0 | 2.1.1 | If your Ansible collection is older please consider updating it first. *Notes*: @@ -87,10 +88,11 @@ export ISE_HOSTNAME=<A.B.C.D> export ISE_USERNAME=<username> export ISE_PASSWORD=<password> export ISE_VERIFY=False # optional, defaults to True -export ISE_VERSION=3.1_Patch_1 # optional, defaults to 3.1_Patch_1 +export ISE_VERSION=3.2_beta # optional, defaults to 3.2_beta export ISE_WAIT_ON_RATE_LIMIT=True # optional, defaults to True export ISE_USES_API_GATEWAY=True # optional, defaults to True export ISE_DEBUG=False # optional, defaults to False +export ISE_SINGLE_REQUEST_TIMEOUT:60 # optional, defaults to 60 ``` Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings: @@ -123,11 +125,12 @@ ise_hostname: <A.B.C.D> ise_username: <username> ise_password: <password> ise_verify: False # optional, defaults to True -ise_version: 3.1_Patch_1 # optional, defaults to 3.1_Patch_1 +ise_version: 3.2_beta # optional, defaults to 3.2_beta ise_wait_on_rate_limit: True # optional, defaults to True ise_debug: False # optional, defaults to False ise_uses_api_gateway: True # optional, defaults to True ise_uses_csrf_token: False # optional, defaults to False +ise_single_request_timeout: 60 # optional, defaults to 60 ``` Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings: @@ -172,11 +175,12 @@ ise_hostname: <A.B.C.D> ise_username: <username> ise_password: <password> ise_verify: False # optional, defaults to True -ise_version: 3.1_Patch_1 # optional, defaults to 3.1_Patch_1 +ise_version: 3.2_beta # optional, defaults to 3.2_beta ise_wait_on_rate_limit: True # optional, defaults to True ise_debug: False # optional, defaults to False ise_uses_api_gateway: True # optional, defaults to True ise_uses_csrf_token: False # optional, defaults to False +ise_single_request_timeout: 60 # optional, defaults to 60 ``` Create a `hosts` ([example](https://github.com/CiscoISE/ansible-ise/blob/main/playbooks/hosts)) file that uses `[ise_servers]` with your Cisco ISE Settings: diff --git a/ansible_collections/cisco/ise/changelogs/changelog.yaml b/ansible_collections/cisco/ise/changelogs/changelog.yaml index cbe35b4b8..929f94bb5 100644 --- a/ansible_collections/cisco/ise/changelogs/changelog.yaml +++ b/ansible_collections/cisco/ise/changelogs/changelog.yaml @@ -917,6 +917,63 @@ releases: 2.5.12: release_date: "2023-01-09" changes: - release_date: Change is detected in a better way. + release_summary: Change is detected in a better way. bugfixes: - - network_access_authorization_rules - recognizes when there are changes.
\ No newline at end of file + - network_access_authorization_rules - recognizes when there are changes. + 2.5.13: + release_date: "2023-07-25" + changes: + release_summary: Several bugfixes in modules. + bugfixes: + - cisco.ise.mnt_session_active_count_info ise_reponse is null fixed. + - Cannot get cisco.ise.rest_id_store to work fixed. + - System Certificate Update does not work but always reports Object already present temporary solution. + - node_deployment tasks fail because of timeout, adding new collection param. + 2.5.14: + release_date: "2023-08-10" + changes: + release_summary: support for none value. + bugfixes: + - system_certificate - added support for none value in the used_by param. + 2.5.15: + release_date: "2023-08-16" + changes: + release_summary: Fixed get_object_by_id. + bugfixes: + - system_certificate - fixed get_object_by_id response. + 2.5.16: + release_date: "2023-09-26" + changes: + release_summary: Fixed active_directory_groups_by_domain_Info. + bugfixes: + - Cannot get cisco.ise.active_directory_groups_by_domain_info to work. + 2.6.0: + release_date: "2023-11-07" + changes: + release_summary: ansible-ise now support 3.2_beta + minor_changes: + - Services included configuration, edda, dataconnect_services, subscriber. + 2.6.1: + release_date: "2023-11-09" + changes: + release_summary: Update to use ciscoisesdk v2.1.1 or newer + bugfixes: + - Updated to use ciscoisesdk v2.1.1 or newer fixing ciscoisesdk problem. + 2.6.2: + release_date: "2023-11-21" + changes: + release_summary: Added missing import + bugfixes: + - Added missing import re in endpoint module + 2.7.0: + release_date: "2023-11-21" + changes: + release_summary: Galaxy updated. + minor_changes: + - cisco.ise collection now supports ansible.utils v3 + 2.8.0: + release_date: "2024-03-19" + changes: + release_summary: Changes the minimum supported version of Ansible to v2.14.0 + minor_changes: + - Changes the minimum supported version from Ansible v2.9.10 to v2.14.0
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/docs/conf.py b/ansible_collections/cisco/ise/docs/conf.py index e2c2539dd..f265f2d6b 100644 --- a/ansible_collections/cisco/ise/docs/conf.py +++ b/ansible_collections/cisco/ise/docs/conf.py @@ -15,7 +15,6 @@ __metaclass__ = type # add these directories to sys.path here. If the directory is relative to the # documentation root, use os.path.abspath to make it absolute, like shown here. # -import datetime import os import sys sys.path.insert(0, os.path.abspath('../plugins/plugin_utils/')) diff --git a/ansible_collections/cisco/ise/hosts b/ansible_collections/cisco/ise/hosts deleted file mode 100644 index a05461e33..000000000 --- a/ansible_collections/cisco/ise/hosts +++ /dev/null @@ -1,8 +0,0 @@ -[ise_servers] -ise_server - -#[ise] -#localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python - -#[ise:vars] -#cloud_provider = aws diff --git a/ansible_collections/cisco/ise/meta/runtime.yml b/ansible_collections/cisco/ise/meta/runtime.yml index 1f18fd726..bcb6dcedc 100644 --- a/ansible_collections/cisco/ise/meta/runtime.yml +++ b/ansible_collections/cisco/ise/meta/runtime.yml @@ -1,2 +1,2 @@ --- -requires_ansible: '>=2.9.10'
\ No newline at end of file +requires_ansible: '>=2.14.0'
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/aws_deployment.yml b/ansible_collections/cisco/ise/playbooks/aws_deployment.yml index 3ad6dc5a0..8cd9a74f8 100644 --- a/ansible_collections/cisco/ise/playbooks/aws_deployment.yml +++ b/ansible_collections/cisco/ise/playbooks/aws_deployment.yml @@ -1,6 +1,6 @@ --- - name: AWS ISE Deployment Playbook - hosts: localhost + hosts: ise connection: local vars: ise_username: admin @@ -10,16 +10,14 @@ ise_dns_server: 208.67.220.220 ise_timezone: America/Costa_Rica - aws_ise_ami: ami-0ffd69a117dbcbb9e + aws_ise_ami: ami-0a8b4f863885c3372 aws_vpc_name: ISE VPC aws_vpc_cidr: 10.10.0.0/16 aws_subnet_cidr: 10.10.1.0/24 aws_region: us-west-2 aws_public_access_cidr: 0.0.0.0/0 - aws_keypair_name: ise-testing-ansible + aws_keypair_name: ise_deployment aws_instance_type: c5.4xlarge - aws_cound: 1 roles: - cisco.ise.aws_deployment -
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/azure_deployment.yml b/ansible_collections/cisco/ise/playbooks/azure_deployment.yml deleted file mode 100644 index 5a1ea11da..000000000 --- a/ansible_collections/cisco/ise/playbooks/azure_deployment.yml +++ /dev/null @@ -1,46 +0,0 @@ ---- -- name: ISE Deployment Playbook - hosts: localhost - connection: local - vars: - ise_deployment_type: single - ise_personas: ["pan-1", "pan-2", "mnt-1", "mnt-2", "psn-1", "psn-2"] - ise_base_hostname: ISE - ise_username: admin - ise_password: P@sbg1234 - ise_ntp_server: 10.10.0.1 - ise_dns_server: 208.67.220.220 - ise_domain: sstcloud.com - ise_timezone: America/Costa_Rica - - - az_rg_name: ISE-RG-ANSIBLE - az_location: southcentralus - az_network_name: ISE-NETWORK - az_subnet_name: ISE-SUBNET - az_network_cidr: - - "10.1.0.0/16" - - "172.100.0.0/16" - az_network_dns: - - "127.0.0.1" - - "127.0.0.2" - az_subnet_cidr: 10.1.0.0/24 - az_securitygroup_name: ISE-SECURITY-GROUP - az_public_access_cidr: - - '174.109.158.0/24' - - '174.109.159.0/24' - az_interface_name: ISE-INTERFACE - az_vm_username: ise-user - az_vm_name: ISE-VM - az_vm_key: "ssh-rsa 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 root@Bryans-MacBook-Air.local" - roles: - - cisco.ise.ise_deployment_in_azure - -# tasks: -# - name: test -# ansible.builtin.set_fact: -# test: "{{a}}" -# test1: "{{(a|int)+2}}" -# - name: Output public IP -# debug: -# msg: "{{test}} - {{test1}}"
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/b.yml b/ansible_collections/cisco/ise/playbooks/b.yml deleted file mode 100644 index a061dc6eb..000000000 --- a/ansible_collections/cisco/ise/playbooks/b.yml +++ /dev/null @@ -1,130 +0,0 @@ ---- -- hosts: ise_servers - vars_files: - - credentials.yml - vars: - ise_login: &ise_login - ise_hostname: "{{ ise_hostname }}" - ise_username: "{{ ise_username }}" - ise_password: "{{ ise_password }}" - ise_verify: "{{ ise_verify }}" - ise_version: "{{ ise_version }}" - ise_debug: "{{ ise_debug }}" - gather_facts: false - tasks: - - name: Create Endpoint - cisco.ise.endpoint: - <<: *ise_login - state: present - #state: absent - description: ansible test - mac: "50:00:00:01:00:16" - name: "Ansible name" - #mac: "50-00-00-04-C3-95" - register: result - - #- name: Get all Endpoint - # cisco.ise.endpoint_info: - # <<: *ise_login - # page: 1 - # size: 20 - #sortasc: string - # register: result - - # - name: Get Endpoint by id - # cisco.ise.endpoint_info: - # <<: *ise_login - # id: 69142550-2576-11ed-990e-4a16cf330648 - # register: result - - # - name: Get all SGt - # cisco.ise.sgt_info: - # <<: *ise_login - # size: 5 - # sortasc: name - # register: result - - # - name: Get SGt by id - # cisco.ise.sgt_info: - # <<: *ise_login - # id: 4d482be5-2863-4015-8ea4-46c00d9e199b - # register: result - - # - name: STG - # cisco.ise.sgt: - # <<: *ise_login - # # ise_uses_api_gateway: "{{ise_uses_api_gateway}}" - # # ise_uses_csrf_token: "{{ise_uses_csrf_token}}" - # state: present - # name: teststg_ansible - # value: -1 - # description: teststg description ANSIBLE number 2 - # register: result - -# - name: Create STG -# hosts: ise -# vars_files: -# - credentials.yml -# gather_facts: false -# tasks: -# - name: Create STG -# cisco.ise.sgt: -# <<: *ise_login -# # ise_uses_api_gateway: "{{ise_uses_api_gateway}}" -# # ise_uses_csrf_token: "{{ise_uses_csrf_token}}" -# state: present -# name: teststg ->teststg3 -# value: -1 -# description: teststg description -> teststg3 description -# register: result - - # - name: Create network device - # loop_control: - # loop_var: device - # cisco.ise.network_device: - # <<: *ise_login - # state: present - # name: "{{device.name}}" - # description: "{{device.description}}" - # coaPort: "{{device.coa_port}}" - # NetworkDeviceGroupList: "{{device.network_device_group_list}}" - # NetworkDeviceIPList: "{{device.network_device_ip_list}}" - # authenticationSettings: - # radiusSharedSecret: "{{device.shared_secret}}" - # loop: "{{network_devices}}" - # when: "network_devices is defined" - # register: result - - - # - name: Create network device single - # cisco.ise.network_device: - # <<: *ise_login - # state: present - # #state: absent - # name: "ISE_EST_Local_Host_TEST" - # description: "example nd" - # coaPort: "0" - # NetworkDeviceGroupList: - # - "Location#All Locations" - # - "Device Type#All Device Types" - # # - "IPSEC#Is IPSEC Device" - # NetworkDeviceIPList: - # - ipaddress: "127.0.0.1" - # mask: 0 - # authenticationSettings: - # radiusSharedSecret: "RADIUS" - # register: result - - # - name: Get all Node Deployment - # cisco.ise.node_deployment_info: - # <<: *ise_login - # #hostname: ise - # register: result - - - name: Debug result. - ansible.builtin.debug: - var: result - - - -#authorization_profile
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/credentials.template b/ansible_collections/cisco/ise/playbooks/credentials.template index b6a7cff1e..6cafc452c 100644 --- a/ansible_collections/cisco/ise/playbooks/credentials.template +++ b/ansible_collections/cisco/ise/playbooks/credentials.template @@ -3,7 +3,7 @@ ise_hostname: <A.B.C.D> ise_username: <username> ise_password: <password> ise_verify: False # optional, defaults to True -ise_version: 3.1.1 # optional, defaults to 3.1.1 +ise_version: 3.2_beta # optional, defaults to 3.2_beta ise_wait_on_rate_limit: True # optional, defaults to True ise_debug: False # optional, defaults to False ise_uses_api_gateway: True # optional, defaults to True diff --git a/ansible_collections/cisco/ise/playbooks/credentials.yml b/ansible_collections/cisco/ise/playbooks/credentials.yml deleted file mode 100644 index ebf5f9bf3..000000000 --- a/ansible_collections/cisco/ise/playbooks/credentials.yml +++ /dev/null @@ -1,19 +0,0 @@ ---- -ise_hostname: 198.18.133.27 -ise_username: admin -ise_password: 991545 # session ID -ise_verify: False # optional, defaults to True -ise_version: 3.1_Patch_1 # optional, defaults to 3.1.1 -ise_wait_on_rate_limit: True # optional, defaults to True -ise_debug: True # optional, defaults to False -ise_uses_api_gateway: True # optional, defaults to True - - -# export ISE_HOSTNAME="198.18.133.27" -# export ISE_USERNAME="admin" -# export ISE_PASSWORD="995210" -# export ISE_VERIFY=False -# export ISE_VERSION="3.1_Patch_1" -# export ISE_WAIT_ON_RATE_LIMIT=True -# export ISE_USES_API_GATEWAY=True -# export ISE_DEBUG=True
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers b/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers index c6c726fcb..5153435b4 100644 --- a/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers +++ b/ansible_collections/cisco/ise/playbooks/group_vars/ise_servers @@ -3,7 +3,7 @@ ise_hostname: "198.18.133.27" ise_username: "admin" ise_password: "910457" -ise_version: "3.1.1" +ise_version: "3.2_beta" ise_verify: False ise_debug: True ise_uses_api_gateway: True diff --git a/ansible_collections/cisco/ise/playbooks/hosts b/ansible_collections/cisco/ise/playbooks/hosts index a05461e33..3e82285e2 100644 --- a/ansible_collections/cisco/ise/playbooks/hosts +++ b/ansible_collections/cisco/ise/playbooks/hosts @@ -1,8 +1,8 @@ [ise_servers] ise_server -#[ise] -#localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python +[ise] +localhost ansible_python_interpreter=/Users/rcampos/.pyenv/shims/python -#[ise:vars] -#cloud_provider = aws +[ise:vars] +cloud_provider = aws diff --git a/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml b/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml index e36ea11a7..2e06f0e61 100644 --- a/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml +++ b/ansible_collections/cisco/ise/playbooks/network_access_authorization_rules.yml @@ -23,7 +23,7 @@ # id: d704e911-a916-11eb-8830-2ec507028ea8 # register: result - - name: Create or update an network_access_authorization_rules + - name: Create a network_access_authorization_rules cisco.ise.network_access_authorization_rules: ise_hostname: "{{ ise_hostname }}" ise_username: "{{ ise_username }}" @@ -51,6 +51,39 @@ policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 register: result - - name: Print result + - name: Print create result + ansible.builtin.debug: + var: result + + - name: Update a network_access_authorization_rule + cisco.ise.network_access_authorization_rules: + ise_hostname: "{{ ise_hostname }}" + ise_username: "{{ ise_username }}" + ise_password: "{{ ise_password }}" + ise_verify: "{{ ise_verify }}" + state: present + rule: + default: false + name: Test2 + hitCounts: 00 + rank: 00 + state: disabled + condition: + conditionType: ConditionReference + isNegate: false + dictionaryName: Network Access + attributeName: EapAuthentication + operator: equals + attributeValue: EAP-MSCHAPv2 + name: EAP-MSCHAPv2 + id: c456a490-0429-4fd4-91d7-efd1eb1f855a + profile: + - PermitAccess + securityGroup: Employee + policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 + id: 9a2ff8d6-e086-5af5-ab4b-78e10c7adf61 + register: result + + - name: Print update result ansible.builtin.debug: var: result diff --git a/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml b/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml index 4556a1de5..22439f41f 100644 --- a/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml +++ b/ansible_collections/cisco/ise/playbooks/network_access_network_condition.yml @@ -33,15 +33,16 @@ name: Endstation condition 1 description: Optional description conditionType: EndstationCondition - ipAddrList: - - 1.1.1.1 - - 2.2.2.2 - macAddrList: - - 00-0E-A6-A7-63-F7,00-0E-A6-A7-63-F8 - - 00-0E-A6-A7-63-F7,-ANY- - - -ANY-,00-0E-A6-A7-63-F8 - cliDnisList: - - TBD + conditions: + - ipAddrList: + - 1.1.1.1 + - 2.2.2.2 + - macAddrList: + - 00-0E-A6-A7-63-F7,00-0E-A6-A7-63-F8 + - 00-0E-A6-A7-63-F7,-ANY- + - -ANY-,00-0E-A6-A7-63-F8 + - cliDnisList: + - TBD register: result - name: Print result diff --git a/ansible_collections/cisco/ise/playbooks/network_device.yml b/ansible_collections/cisco/ise/playbooks/network_device.yml index 47ec35d13..a1a654da6 100644 --- a/ansible_collections/cisco/ise/playbooks/network_device.yml +++ b/ansible_collections/cisco/ise/playbooks/network_device.yml @@ -41,16 +41,6 @@ mask: 32 register: result - ## Using environment variables - - name: Create or update a network device - cisco.ise.network_device: - state: present - name: ISE_EST_Local_Host_6 - NetworkDeviceIPList: - - ipaddress: 127.16.0.1 - mask: 32 - register: result - # - name: Delete a network device by id # cisco.ise.network_device: # ise_hostname: "{{ ise_hostname }}" diff --git a/ansible_collections/cisco/ise/playbooks/playbookstest.yml b/ansible_collections/cisco/ise/playbooks/playbookstest.yml deleted file mode 100644 index c395d1796..000000000 --- a/ansible_collections/cisco/ise/playbooks/playbookstest.yml +++ /dev/null @@ -1,183 +0,0 @@ ---- -- hosts: ise_servers - gather_facts: false - vars: - itemTest: - name: "Cisco_Ansible_Test_09_12" - accessType: "ACCESS_ACCEPT" - description: "Test" - authzProfileType: "SWITCH" - vlan: - nameID: "172_28_1_0-VN_IOT" - tagID: 1 - trackMovement: false - agentlessPosture: false - serviceTemplate: false - profileName: "Cisco" - tasks: - ## https://github.com/CiscoISE/ansible-ise/issues/72 - ## post 400 - # - name: Get all Network Access Authorization Rules - # cisco.ise.network_access_authorization_rules: - # state: present - # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 - # rule: - # default: false - # #id: d9e67664-799d-4ad9-a407-8365117c18e5 - # name: Ansible B TEST - # hitCounts: 0 - # rank: 0 - # state: enabled - # condition: - # conditionType: ConditionAndBlock - # isNegate: false - # children: - # - conditionType: ConditionReference - # isNegate: false - # name: Wireless_Access - # id: ff6008e0-5c35-48a3-9fab-e0e709983369 - # # description: >- - # # Default condition used to match any authentication request from Cisco - # # Wireless LAN Controller. - # - conditionType: ConditionAttributes - # isNegate: false - # dictionaryName: IdentityGroup - # attributeName: Name - # operator: equals - # #dictionaryValue: null - # attributeValue: 'Endpoint Identity Groups:Blocked List' - # profile: - # - Blackhole_Wireless_Access - # #securityGroup: null - # register: result - - # - name: Get all Network Access Authorization Rules - # cisco.ise.network_access_authorization_rules_info: - # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 - # register: result - - ## https://github.com/CiscoISE/ansible-ise/issues/74 - - # - name: Create or update Authorization profile - # cisco.ise.authorization_profile: - # name: "{{ itemTest.name }}" - # accessType: "{{ itemTest.accessType }}" - # description: "{{ itemTest.description }}" - # authzProfileType: "{{ itemTest.authzProfileType }}" - # vlan: - # nameID: "{{ itemTest.vlan.nameID }}" - # tagID: - # "{{itemTest.vlan.tagID|int}}" - # trackMovement: "{{ itemTest.trackMovement }}" - # agentlessPosture: "{{ itemTest.agentlessPosture }}" - # serviceTemplate: "{{ itemTest.serviceTemplate }}" - # profileName: "{{ itemTest.profileName }}" - # register: result - - # - name: Get all Authorization Profile - # cisco.ise.authorization_profile_info: - # name: Cisco_Temporal_Onboard - # register: result - - # - name: debug - # debug: - # msg: "{{ itemTest.vlan.tagID | int == 0 }}" - - # - name: debug - # debug: - # msg: | - # {{ item.vlanID | int }} - # loop: - # - { "vlanID": "1" } - # - { "vlanID": "2" } - # - { "vlanID": 2 } - - # - name: debug - # debug: - # var: |- - # {{ item.vlanID | int }} - # loop: - # - { "vlanID": 1 } - # - { "vlanID": "2" } - - ## https://github.com/CiscoISE/ansible-ise/issues/76 - ## Node group creation is not idempotent - ## fatal: [localhost]: FAILED! => {"changed": false, "msg": "An error occured when executing operation. The error was: [409] - The request could not be processed because it conflicts with some established rule of the system.\n{\n \"error\" : {\n \"message\" : \"NodeGroup 'TestGroup1' already exist.\"\n },\n \"version\" : \"1.0.0\"\n}"} - # - name: Create test node group. - # cisco.ise.node_group: - # state: present - # description: "Testing creation and idempotency" - # name: "TesAnsible76" - # nodeGroupName: "TesAnsible76" - # forceDelete: true - # register: result - - # - name: Get all Node Group - # cisco.ise.node_group_info: - # nodeGroupName: "NodeGroup2" - # register: result - - ##https://github.com/CiscoISE/ansible-ise/issues/79 - ## Cannot update - # - name: Create or update an network_access_authentication_rules - # cisco.ise.network_access_authentication_rules: - # state: present - # rule: - # default: false - # name: TestAnsibleIssue79 - # hitCounts: 00 - # rank: 0 - # state: enabled - # #id: b086e85e-6118-4b67-8efc-05d692423afb - # condition: - # conditionType: ConditionReference - # isNegate: false - # dictionaryName: Network Access - # attributeName: EapAuthentication - # operator: equals - # attributeValue: EAP-MSCHAPv2 - # name: EAP-MSCHAPv2 - # id: c456a490-0429-4fd4-91d7-efd1eb1f855a - # ifAuthFail: REJECT - # ifUserNotFound: REJECT - # ifProcessFail: DROP - # policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 - # register: result - - - ##https://github.com/CiscoISE/ansible-ise/issues/77 - ## Get error - ## node_group_node_info - # - name: Get all Node Group Node - # cisco.ise.node_group_node_info: - # nodeGroupName: TesAnsible76 - # register: result - - ##https://github.com/CiscoISE/ansible-ise/issues/81 - ## Unable to update Authorization Policies - ##network_access_authorization_rules - - name: CRUD - cisco.ise.network_access_authorization_rules: - state: present - #state: absent - rule: - default: false - name: TestAnsibleIssue81 - rank: 0 - state: enabled - condition: - conditionType: ConditionAttributes - isNegate: false - dictionaryName: IdentityGroup - attributeName: Name - operator: equals - attributeValue: 'Endpoint Identity Groups:IAC_Lab1' - profile: - - Blackhole_Wireless_Access - #securityGroup: BYOD - policyId: acd4b55d-dca3-4b93-a160-8a2d01669827 - register: result - - - name: Print Authorization profile - ansible.builtin.debug: - var: result
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/playbooks/profiler-services.yml b/ansible_collections/cisco/ise/playbooks/profiler-services.yml deleted file mode 100644 index 85d9d9018..000000000 --- a/ansible_collections/cisco/ise/playbooks/profiler-services.yml +++ /dev/null @@ -1,40 +0,0 @@ ---- -# profiler_config: -# # - netflow: -# - dhcp: -# interfaces: -# - interface: 'GigabitEthernet0' -# port: 67 -# # - dhcpSpan: -# # - http: -# - radius: {} -# - nmap: {} -# # - dns: -# - snmpQuery: -# retries: 2 -# timeout: 1000 -# eventTimeout: 30 -# # - snmpTrap: -# - activeDirectory: -# daysBeforeRescan: 1 -# # - pxgrid: {} - -profiler_config: - #netflow: null - dhcp: - interfaces: - - interface: GigabitEthernet 0 - port: 67 - #dhcpSpan: null - #http: null - radius: [] - nmap: [] - #dns: null - snmpQuery: - retries: 2 - timeout: 1000 - eventTimeout: 30 - #snmpTrap: null - activeDirectory: - daysBeforeRescan: 1 - #pxgrid: null
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/plugins/.DS_Store b/ansible_collections/cisco/ise/plugins/.DS_Store Binary files differnew file mode 100644 index 000000000..874d3d2c6 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/.DS_Store diff --git a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py index c303d3b77..76f1adff1 100644 --- a/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py +++ b/ansible_collections/cisco/ise/plugins/action/active_directory_groups_by_domain_info.py @@ -80,15 +80,12 @@ class ActionModule(ActionBase): self._result.update(dict(ise_response={})) ise = ISESDK(params=self._task.args) + response = ise.exec( + family="active_directory", + function='get_groups_by_domain', + params=self.get_object(self._task.args) + ).response['ERSActiveDirectoryGroups'] - id = self._task.args.get("id") - name = self._task.args.get("name") - if not name and not id: - response = ise.exec( - family="active_directory", - function='get_groups_by_domain', - params=self.get_object(self._task.args) - ).response['ERSActiveDirectoryGroups'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/action/configuration.py index b137aa8cc..de3fe1eff 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping.py +++ b/ansible_collections/cisco/ise/plugins/action/configuration.py @@ -32,97 +32,46 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - state=dict(type="str", default="present", choices=["present", "absent"]), - id=dict(type="str"), - isData=dict(type="bool"), - isDefaultVlan=dict(type="bool"), - lastUpdate=dict(type="str"), - maxValue=dict(type="int"), - name=dict(type="str"), - vnId=dict(type="str"), - vnName=dict(type="str"), + state=dict(type="str", default="present", choices=["present"]), + enableEPO=dict(type="bool"), + enableRCM=dict(type="bool"), )) required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), + ("state", "present", [], True), ] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecVnVlanMapping(object): +class Configuration(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( - id=params.get("id"), - is_data=params.get("isData"), - is_default_vlan=params.get("isDefaultVlan"), - last_update=params.get("lastUpdate"), - max_value=params.get("maxValue"), - name=params.get("name"), - vn_id=params.get("vnId"), - vn_name=params.get("vnName"), + enable_epo=params.get("enableEPO"), + enable_rcm=params.get("enableRCM"), ) def get_object_by_name(self, name): - # NOTICE: Get does not support/work for filter by name with EQ + # NOTICE: Does not have a get by name method or it is in another action result = None - gen_items_responses = self.ise.exec( - family="vn_vlan_mapping", - function="get_vn_vlan_mappings_generator", - params={"filter": "name.EQ.{name}".format(name=name)} - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - result = get_dict_result(items, 'name', name) - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result + items = self.ise.exec( + family="configuration", + function="get_configuration" + ).response + result = get_dict_result(items, 'name', name) return result def get_object_by_id(self, id): - try: - result = self.ise.exec( - family="vn_vlan_mapping", - function="get_vn_vlan_mapping_by_id", - handle_func_exception=False, - params={"id": id} - ).response['response'] - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - if isinstance(result, list) and len(result) > 0: - return result[0] + # NOTICE: Does not have a get by id method or it is in another action + result = None return result def exists(self): + prev_obj = None id_exists = False name_exists = False - prev_obj = None o_id = self.new_object.get("id") name = self.new_object.get("name") if o_id: @@ -135,8 +84,6 @@ class TrustsecVnVlanMapping(object): _id = prev_obj.get("id") if id_exists and name_exists and o_id != _id: raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) it_exists = prev_obj is not None and isinstance(prev_obj, dict) return (it_exists, prev_obj) @@ -144,14 +91,8 @@ class TrustsecVnVlanMapping(object): requested_obj = self.new_object obj_params = [ - ("id", "id"), - ("isData", "is_data"), - ("isDefaultVlan", "is_default_vlan"), - ("lastUpdate", "last_update"), - ("maxValue", "max_value"), - ("name", "name"), - ("vnId", "vn_id"), - ("vnName", "vn_name"), + ("enableEPO", "enable_epo"), + ("enableRCM", "enable_rcm"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -159,38 +100,13 @@ class TrustsecVnVlanMapping(object): requested_obj.get(ansible_param)) for (ise_param, ansible_param) in obj_params) - def create(self): - result = self.ise.exec( - family="vn_vlan_mapping", - function="create_vn_vlan_mapping", - params=self.new_object, - ).response - return result - def update(self): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="vn_vlan_mapping", - function="update_vn_vlan_mapping_by_id", - params=self.new_object - ).response - return result - - def delete(self): - id = self.new_object.get("id") - name = self.new_object.get("name") - result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="vn_vlan_mapping", - function="delete_vn_vlan_mapping_by_id", + family="configuration", + function="update_configuration", params=self.new_object ).response return result @@ -230,12 +146,11 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecVnVlanMapping(self._task.args, ise) + obj = Configuration(self._task.args, ise) state = self._task.args.get("state") response = None - if state == "present": (obj_exists, prev_obj) = obj.exists() if obj_exists: @@ -249,19 +164,7 @@ class ActionModule(ActionBase): response = prev_obj ise.object_already_present() else: - ise_create_response = obj.create() - (obj_exists, created_obj) = obj.exists() - response = created_obj - ise.object_created() - - elif state == "absent": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - obj.delete() - response = prev_obj - ise.object_deleted() - else: - ise.object_already_absent() + ise.fail_json("Object does not exists, plugin only has update") self._result.update(dict(ise_response=response)) self._result.update(ise.exit_json()) diff --git a/ansible_collections/cisco/ise/plugins/action/configuration_info.py b/ansible_collections/cisco/ise/plugins/action/configuration_info.py new file mode 100644 index 000000000..d3ed0d5fe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/configuration_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="configuration", + function='get_configuration', + params=self.get_object(self._task.args) + ).response + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/action/connector_config.py index 3cb7209b8..8e124b7ed 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app.py +++ b/ansible_collections/cisco/ise/plugins/action/connector_config.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -33,68 +33,54 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + additionalProperties=dict(type="dict"), + attributes=dict(type="dict"), + connectorName=dict(type="str"), + connectorType=dict(type="str"), + deltasyncSchedule=dict(type="dict"), description=dict(type="str"), - id=dict(type="str"), - name=dict(type="str"), - networkIdentities=dict(type="list"), + enabled=dict(type="bool"), + fullsyncSchedule=dict(type="dict"), + protocol=dict(type="str"), + skipCertificateValidations=dict(type="bool"), + url=dict(type="dict"), )) required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), + ("state", "present", ["connectorName"], True), + ("state", "absent", ["connectorName"], True), ] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecNbarApp(object): +class ConnectorConfig(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + additional_properties=params.get("additionalProperties"), + attributes=params.get("attributes"), + connector_name=params.get("connectorName"), + connector_type=params.get("connectorType"), + deltasync_schedule=params.get("deltasyncSchedule"), description=params.get("description"), - id=params.get("id"), - name=params.get("name"), - network_identities=params.get("networkIdentities"), + enabled=params.get("enabled"), + fullsync_schedule=params.get("fullsyncSchedule"), + protocol=params.get("protocol"), + skip_certificate_validations=params.get("skipCertificateValidations"), + url=params.get("url"), ) def get_object_by_name(self, name): - # NOTICE: Get does not support/work for filter by name with EQ - result = None - gen_items_responses = self.ise.exec( - family="nbar_app", - function="get_nbar_apps_generator", - params={"filter": "name.EQ.{name}".format(name=name)} - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - result = get_dict_result(items, 'name', name) - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result - return result - - def get_object_by_id(self, id): try: result = self.ise.exec( - family="nbar_app", - function="get_nbar_app_by_id", + family="edda", + function="get_connector_config_by_connector_name", + params={"connector_name": name}, handle_func_exception=False, - params={"id": id} ).response['response'] + result = get_dict_result(result, 'connectorName', name) except (TypeError, AttributeError) as e: self.ise.fail_json( msg=( @@ -107,8 +93,11 @@ class TrustsecNbarApp(object): ) except Exception: result = None - if isinstance(result, list) and len(result) > 0: - return result[0] + return result + + def get_object_by_id(self, id): + # NOTICE: Does not have a get by id method or it is in another action + result = None return result def exists(self): @@ -116,7 +105,7 @@ class TrustsecNbarApp(object): name_exists = False prev_obj = None o_id = self.new_object.get("id") - name = self.new_object.get("name") + name = self.new_object.get("connectorName") if o_id: prev_obj = self.get_object_by_id(o_id) id_exists = prev_obj is not None and isinstance(prev_obj, dict) @@ -127,8 +116,6 @@ class TrustsecNbarApp(object): _id = prev_obj.get("id") if id_exists and name_exists and o_id != _id: raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) it_exists = prev_obj is not None and isinstance(prev_obj, dict) return (it_exists, prev_obj) @@ -136,10 +123,17 @@ class TrustsecNbarApp(object): requested_obj = self.new_object obj_params = [ + ("additionalProperties", "additional_properties"), + ("attributes", "attributes"), + ("connectorName", "connector_name"), + ("connectorType", "connector_type"), + ("deltasyncSchedule", "deltasync_schedule"), ("description", "description"), - ("id", "id"), - ("name", "name"), - ("networkIdentities", "network_identities"), + ("enabled", "enabled"), + ("fullsyncSchedule", "fullsync_schedule"), + ("protocol", "protocol"), + ("skipCertificateValidations", "skip_certificate_validations"), + ("url", "url"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -149,8 +143,8 @@ class TrustsecNbarApp(object): def create(self): result = self.ise.exec( - family="nbar_app", - function="create_nbar_app", + family="edda", + function="create_connector_config", params=self.new_object, ).response return result @@ -159,12 +153,12 @@ class TrustsecNbarApp(object): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) + if not name: + name_ = self.get_object_by_id(id).get("name") + self.new_object.update(dict(name=name_)) result = self.ise.exec( - family="nbar_app", - function="update_nbar_app_by_id", + family="edda", + function="update_connector_config_by_connector_name", params=self.new_object ).response return result @@ -173,12 +167,12 @@ class TrustsecNbarApp(object): id = self.new_object.get("id") name = self.new_object.get("name") result = None - if not id: - id_ = self.get_object_by_name(name).get("id") - self.new_object.update(dict(id=id_)) + if not name: + name_ = self.get_object_by_id(id).get("name") + self.new_object.update(dict(name=name_)) result = self.ise.exec( - family="nbar_app", - function="delete_nbar_app_by_id", + family="edda", + function="delete_connector_config_by_connector_name", params=self.new_object ).response return result @@ -218,7 +212,7 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecNbarApp(self._task.args, ise) + obj = ConnectorConfig(self._task.args, ise) state = self._task.args.get("state") diff --git a/ansible_collections/cisco/ise/plugins/action/connector_config_info.py b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py new file mode 100644 index 000000000..05bd40cbe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/connector_config_info.py @@ -0,0 +1,101 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + connectorName=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + connector_name=params.get("connectorName"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("connectorName") + if name: + response = ise.exec( + family="edda", + function='get_connector_config_by_connector_name', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result + if not name and not id: + response = ise.exec( + family="edda", + function='get_connector_config', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py new file mode 100644 index 000000000..ffd19d387 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="dataconnect_services", + function='get_odbc_detail', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py new file mode 100644 index 000000000..5d794c926 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="dataconnect_services", + function='get_dataconnect_service', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py index ab7effb63..0fd96ad3e 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_delete.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + password=dict(type="str", no_log=True), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + password=params.get("password"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_delete_sg_vn_mappings", + family="dataconnect_services", + function="update_dataconnect_password", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py index f84f91108..f9db60ec8 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_update.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_password_expiry.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + passwordExpiresInDays=dict(type="int"), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + password_expires_in_days=params.get("passwordExpiresInDays"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_update_sg_vn_mappings", + family="dataconnect_services", + function="update_dataconnect_password_expiry", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py index 95943d628..e7232ab0e 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_create.py +++ b/ansible_collections/cisco/ise/plugins/action/dataconnect_settings_status.py @@ -27,7 +27,7 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + isEnabled=dict(type="bool"), )) required_if = [] @@ -65,7 +65,7 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + is_enabled=params.get("isEnabled"), ) return new_object @@ -78,8 +78,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="virtual_network", - function="bulk_create_virtual_networks", + family="dataconnect_services", + function="set_data_connect_service", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py index 8ef7ec09e..58e3d55d6 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authentication_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, @@ -33,6 +32,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + identitySourceId=dict(type="str"), identitySourceName=dict(type="str"), ifAuthFail=dict(type="str"), ifProcessFail=dict(type="str"), @@ -58,6 +58,7 @@ class DeviceAdministrationAuthenticationRules(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + identity_source_id=params.get("identitySourceId"), identity_source_name=params.get("identitySourceName"), if_auth_fail=params.get("ifAuthFail"), if_process_fail=params.get("ifProcessFail"), @@ -133,6 +134,7 @@ class DeviceAdministrationAuthenticationRules(object): requested_obj = self.new_object obj_params = [ + ("identitySourceId", "identity_source_id"), ("identitySourceName", "identity_source_name"), ("ifAuthFail", "if_auth_fail"), ("ifProcessFail", "if_process_fail"), diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py index c1a42a95c..2645800ce 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_authorization_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py index 97df92d65..3f32c7c94 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_conditions.py @@ -37,6 +37,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -70,6 +71,7 @@ class DeviceAdministrationConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -152,6 +154,7 @@ class DeviceAdministrationConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py index 895c4c6e2..38718ced2 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_global_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py index 570495d89..27f5b3401 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_local_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py index 502b5b6c3..10bcdc558 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_network_conditions.py @@ -38,7 +38,11 @@ argument_spec.update(dict( id=dict(type="str"), link=dict(type="dict"), name=dict(type="str"), - conditions=dict(type="list"), + deviceList=dict(type="list"), + cliDnisList=dict(type="list"), + ipAddrList=dict(type="list"), + macAddrList=dict(type="list"), + deviceGroupList=dict(type="list"), )) required_if = [ @@ -59,7 +63,11 @@ class DeviceAdministrationNetworkConditions(object): id=params.get("id"), link=params.get("link"), name=params.get("name"), - conditions=params.get("conditions"), + device_list=params.get("deviceList"), + cli_dnis_list=params.get("cliDnisList"), + ip_addr_list=params.get("ipAddrList"), + mac_addr_list=params.get("macAddrList"), + device_group_list=params.get("deviceGroupList"), ) def get_object_by_name(self, name): @@ -124,7 +132,11 @@ class DeviceAdministrationNetworkConditions(object): ("id", "id"), ("link", "link"), ("name", "name"), - ("conditions", "conditions"), + ("deviceList", "device_list"), + ("cliDnisList", "cli_dnis_list"), + ("ipAddrList", "ip_addr_list"), + ("macAddrList", "mac_addr_list"), + ("deviceGroupList", "device_group_list"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update diff --git a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py index 35431f36e..e0ffd4d73 100644 --- a/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/device_administration_time_date_conditions.py @@ -40,6 +40,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -73,6 +74,7 @@ class DeviceAdministrationTimeDateConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -150,6 +152,7 @@ class DeviceAdministrationTimeDateConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py new file mode 100644 index 000000000..4b4d92cbe --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/dictionary_references_info.py @@ -0,0 +1,90 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("id") + name = self._task.args.get("name") + if not name and not id: + response = ise.exec( + family="edda", + function='get_edda_dictionary_references', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/endpoint.py b/ansible_collections/cisco/ise/plugins/action/endpoint.py index b8526e704..5de00e6d8 100644 --- a/ansible_collections/cisco/ise/plugins/action/endpoint.py +++ b/ansible_collections/cisco/ise/plugins/action/endpoint.py @@ -31,6 +31,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + name=dict(type="str"), description=dict(type="str"), mac=dict(type="str"), profileId=dict(type="str"), @@ -46,8 +47,8 @@ argument_spec.update(dict( )) required_if = [ - ("state", "present", ["id", "mac"], True), - ("state", "absent", ["id", "mac"], True), + ("state", "present", ["id", "name"], True), + ("state", "absent", ["id", "name"], True), ] required_one_of = [] mutually_exclusive = [] @@ -58,6 +59,7 @@ class Endpoint(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + name=params.get("name"), description=params.get("description"), mac=params.get("mac"), profile_id=params.get("profileId"), @@ -123,10 +125,7 @@ class Endpoint(object): result = False prev_obj = None id = self.new_object.get("id") - name = self.new_object.get("mac") - if name: - name = re.sub("[-:.]", "", name).lower() - self.new_object.update(dict(mac=name)) + name = self.new_object.get("name") if id: prev_obj = self.get_object_by_id(id) result = prev_obj is not None and isinstance(prev_obj, dict) @@ -139,6 +138,7 @@ class Endpoint(object): requested_obj = self.new_object obj_params = [ + ("name", "name"), ("description", "description"), ("mac", "mac"), ("profileId", "profile_id"), @@ -168,7 +168,7 @@ class Endpoint(object): def update(self): id = self.new_object.get("id") - name = self.new_object.get("mac") + name = self.new_object.get("name") result = None if not id: id_ = self.get_object_by_name(name).get("id") @@ -182,7 +182,7 @@ class Endpoint(object): def delete(self): id = self.new_object.get("id") - name = self.new_object.get("mac") + name = self.new_object.get("name") result = None if not id: id_ = self.get_object_by_name(name).get("id") diff --git a/ansible_collections/cisco/ise/plugins/action/filter_policy.py b/ansible_collections/cisco/ise/plugins/action/filter_policy.py index 3f4732053..d2a3ca73e 100644 --- a/ansible_collections/cisco/ise/plugins/action/filter_policy.py +++ b/ansible_collections/cisco/ise/plugins/action/filter_policy.py @@ -31,9 +31,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ise_compare_equality, get_dict_result, ) -from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( - InconsistentParameters, -) # Get common arguments specification argument_spec = ise_argument_spec() diff --git a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py index c4c748317..643df1b6d 100644 --- a/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py +++ b/ansible_collections/cisco/ise/plugins/action/mnt_session_active_count_info.py @@ -84,7 +84,7 @@ class ActionModule(ActionBase): family="misc", function='get_active_count', params=self.get_object(self._task.args) - ).response['count'] + ).response['sessionCount']['count'] self._result.update(dict(ise_response=response)) self._result.update(ise.exit_json()) return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py index 63e8d4bce..b8663b844 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_authentication_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, @@ -33,6 +32,7 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), + identitySourceId=dict(type="str"), identitySourceName=dict(type="str"), ifAuthFail=dict(type="str"), ifProcessFail=dict(type="str"), @@ -58,6 +58,7 @@ class NetworkAccessAuthenticationRules(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( + identity_source_id=params.get("identitySourceId"), identity_source_name=params.get("identitySourceName"), if_auth_fail=params.get("ifAuthFail"), if_process_fail=params.get("ifProcessFail"), @@ -133,6 +134,7 @@ class NetworkAccessAuthenticationRules(object): requested_obj = self.new_object obj_params = [ + ("identitySourceId", "identity_source_id"), ("identitySourceName", "identity_source_name"), ("ifAuthFail", "if_auth_fail"), ("ifProcessFail", "if_process_fail"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py index 889963294..2b6ae8c21 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_authorization_rules.py @@ -21,9 +21,7 @@ from ansible.errors import AnsibleActionFail from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, - ise_compare_equality, ise_compare_equality2, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py index a80689189..7ab7a5b7e 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_conditions.py @@ -37,6 +37,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -70,6 +71,7 @@ class NetworkAccessConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -152,6 +154,7 @@ class NetworkAccessConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py index b2d3e9bcd..b67519de4 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_global_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py index 462fd6081..c5b3c4d86 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_local_exception_rules.py @@ -22,7 +22,6 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, ise_compare_equality, - get_dict_result, ) from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( InconsistentParameters, diff --git a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py index 65957d072..23b46c263 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/action/network_access_time_date_conditions.py @@ -40,6 +40,7 @@ argument_spec.update(dict( id=dict(type="str"), name=dict(type="str"), attributeName=dict(type="str"), + attributeId=dict(type="str"), attributeValue=dict(type="str"), dictionaryName=dict(type="str"), dictionaryValue=dict(type="str"), @@ -73,6 +74,7 @@ class NetworkAccessTimeDateConditions(object): id=params.get("id"), name=params.get("name"), attribute_name=params.get("attributeName"), + attribute_id=params.get("attributeId"), attribute_value=params.get("attributeValue"), dictionary_name=params.get("dictionaryName"), dictionary_value=params.get("dictionaryValue"), @@ -150,6 +152,7 @@ class NetworkAccessTimeDateConditions(object): ("id", "id"), ("name", "name"), ("attributeName", "attribute_name"), + ("attributeId", "attribute_id"), ("attributeValue", "attribute_value"), ("dictionaryName", "dictionary_name"), ("dictionaryValue", "dictionary_value"), diff --git a/ansible_collections/cisco/ise/plugins/action/network_device_group.py b/ansible_collections/cisco/ise/plugins/action/network_device_group.py index 8cd682e9c..d45ef371a 100644 --- a/ansible_collections/cisco/ise/plugins/action/network_device_group.py +++ b/ansible_collections/cisco/ise/plugins/action/network_device_group.py @@ -32,7 +32,7 @@ argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), name=dict(type="str"), description=dict(type="str"), - othername=dict(type="str"), + ndgtype=dict(type="str"), id=dict(type="str"), )) @@ -51,7 +51,7 @@ class NetworkDeviceGroup(object): self.new_object = dict( name=params.get("name"), description=params.get("description"), - othername=params.get("othername"), + ndgtype=params.get("ndgtype"), id=params.get("id"), ) @@ -122,7 +122,7 @@ class NetworkDeviceGroup(object): obj_params = [ ("name", "name"), ("description", "description"), - ("othername", "othername"), + ("ndgtype", "ndgtype"), ("id", "id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params diff --git a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py index af546b5ef..9d5364d4d 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py +++ b/ansible_collections/cisco/ise/plugins/action/node_primary_to_standalone.py @@ -37,7 +37,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py index 9cbd890b9..386e2aada 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/node_secondary_to_primary.py @@ -37,7 +37,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py index 71f25d3d7..53a9a7920 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py +++ b/ansible_collections/cisco/ise/plugins/action/node_services_profiler_probe_config.py @@ -21,7 +21,6 @@ from ansible.errors import AnsibleActionFail from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ISESDK, ise_argument_spec, - ise_compare_equality, ise_compare_equality2, get_dict_result, ) diff --git a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py index def196c60..2a6dcb0b2 100644 --- a/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/node_standalone_to_primary.py @@ -36,7 +36,7 @@ argument_spec.update(dict( required_if = [] required_one_of = [ ("hostname"), -], +] mutually_exclusive = [] required_together = [] diff --git a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py index e6e6668b7..7e4007d03 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_check_standalone.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py index a0a3e6d8a..8acba2dd2 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_export_certs.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py index 9de4ae5ae..8e7a1c2b5 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_promote_primary.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py index 708551dd2..2a1b008f2 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_register_node.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_register_node.py @@ -18,8 +18,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node argument_spec = dict( diff --git a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py index bca25ce3d..085271454 100644 --- a/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py +++ b/ansible_collections/cisco/ise/plugins/action/personas_update_roles_services.py @@ -10,8 +10,6 @@ except ImportError: else: ANSIBLE_UTILS_IS_INSTALLED = True from ansible.errors import AnsibleActionFail -from urllib.parse import quote -import time from ansible_collections.cisco.ise.plugins.plugin_utils.personas_utils import Node from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( ise_compare_equality, @@ -97,7 +95,7 @@ class ActionModule(ActionBase): try: prev_obj = node.get_roles_services() except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if prev_obj: if obj.requires_update(prev_obj, request_obj): try: diff --git a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py index 1e138018a..298223855 100644 --- a/ansible_collections/cisco/ise/plugins/action/rest_id_store.py +++ b/ansible_collections/cisco/ise/plugins/action/rest_id_store.py @@ -33,6 +33,7 @@ argument_spec.update(dict( name=dict(type="str"), description=dict(type="str"), ersRestIDStoreAttributes=dict(type="dict"), + ersRestIDStoreUserAttributes=dict(type="dict"), id=dict(type="str"), )) @@ -52,6 +53,7 @@ class RestIdStore(object): name=params.get("name"), description=params.get("description"), ers_rest_idstore_attributes=params.get("ersRestIDStoreAttributes"), + ers_rest_idstore_user_attributes=params.get("ersRestIDStoreUserAttributes"), id=params.get("id"), ) @@ -120,6 +122,7 @@ class RestIdStore(object): ("name", "name"), ("description", "description"), ("ersRestIDStoreAttributes", "ers_rest_idstore_attributes"), + ("ersRestIDStoreUserAttributes", "ers_rest_idstore_user_attributes"), ("id", "id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params @@ -129,6 +132,7 @@ class RestIdStore(object): for (ise_param, ansible_param) in obj_params) def create(self): + print(self.new_object) result = self.ise.exec( family="restid_store", function="create_rest_id_store", @@ -221,6 +225,7 @@ class ActionModule(ActionBase): self._result.update(dict(ise_update_response=ise_update_response)) (obj_exists, updated_obj) = obj.exists() response = updated_obj + ise.object_updated() has_changed = None has_changed = ise_update_response.get("UpdatedFieldsList").get("updatedField") if (len(has_changed) == 0 or diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/action/subscriber.py index ff1dd8fd7..a3713078a 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -33,42 +33,46 @@ argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( state=dict(type="str", default="present", choices=["present", "absent"]), - additionalAttributes=dict(type="str"), - id=dict(type="str"), - lastUpdate=dict(type="str"), - name=dict(type="str"), + enabled=dict(type="bool"), + friendlyName=dict(type="str"), + identityGroups=dict(type="str"), + imeis=dict(type="str"), + imsi=dict(type="str"), + ki=dict(type="str"), + opc=dict(type="str"), + subscriberId=dict(type="str"), )) -required_if = [ - ("state", "present", ["id", "name"], True), - ("state", "absent", ["id", "name"], True), -] +required_if = [] required_one_of = [] mutually_exclusive = [] required_together = [] -class TrustsecVn(object): +class Subscriber(object): def __init__(self, params, ise): self.ise = ise self.new_object = dict( - additional_attributes=params.get("additionalAttributes"), - id=params.get("id"), - last_update=params.get("lastUpdate"), - name=params.get("name"), + enabled=params.get("enabled"), + friendly_name=params.get("friendlyName"), + identity_groups=params.get("identityGroups"), + imeis=params.get("imeis"), + imsi=params.get("imsi"), + ki=params.get("ki"), + opc=params.get("opc"), + subscriber_id=params.get("subscriberId"), ) def get_object_by_name(self, name): # NOTICE: Get does not support/work for filter by name with EQ result = None gen_items_responses = self.ise.exec( - family="virtual_network", - function="get_virtual_networks_generator", - params={"filter": "name.EQ.{name}".format(name=name)} + family="subscriber", + function="get_all_subscribers_generator" ) try: for items_response in gen_items_responses: - items = items_response.response['response'] + items = items_response.response.get('response', []) result = get_dict_result(items, 'name', name) if result: return result @@ -90,10 +94,10 @@ class TrustsecVn(object): def get_object_by_id(self, id): try: result = self.ise.exec( - family="virtual_network", - function="get_virtual_network_by_id", + family="subscriber", + function="get_subscriber_by_id", handle_func_exception=False, - params={"id": id} + params={"subscriber_id": id} ).response['response'] except (TypeError, AttributeError) as e: self.ise.fail_json( @@ -107,15 +111,13 @@ class TrustsecVn(object): ) except Exception: result = None - if isinstance(result, list) and len(result) > 0: - return result[0] return result def exists(self): id_exists = False name_exists = False prev_obj = None - o_id = self.new_object.get("id") + o_id = self.new_object.get("subscriberId") name = self.new_object.get("name") if o_id: prev_obj = self.get_object_by_id(o_id) @@ -136,10 +138,14 @@ class TrustsecVn(object): requested_obj = self.new_object obj_params = [ - ("additionalAttributes", "additional_attributes"), - ("id", "id"), - ("lastUpdate", "last_update"), - ("name", "name"), + ("enabled", "enabled"), + ("friendlyName", "friendly_name"), + ("identityGroups", "identity_groups"), + ("imeis", "imeis"), + ("imsi", "imsi"), + ("ki", "ki"), + ("opc", "opc"), + ("subscriberId", "subscriber_id"), ] # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params # If any does not have eq params, it requires update @@ -149,8 +155,8 @@ class TrustsecVn(object): def create(self): result = self.ise.exec( - family="virtual_network", - function="create_virtual_network", + family="subscriber", + function="create_subscriber", params=self.new_object, ).response return result @@ -163,8 +169,8 @@ class TrustsecVn(object): id_ = self.get_object_by_name(name).get("id") self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="virtual_network", - function="update_virtual_network_by_id", + family="subscriber", + function="update_subscriber", params=self.new_object ).response return result @@ -177,8 +183,8 @@ class TrustsecVn(object): id_ = self.get_object_by_name(name).get("id") self.new_object.update(dict(id=id_)) result = self.ise.exec( - family="virtual_network", - function="delete_virtual_network_by_id", + family="subscriber", + function="delete_subscriber", params=self.new_object ).response return result @@ -218,7 +224,7 @@ class ActionModule(ActionBase): self._check_argspec() ise = ISESDK(params=self._task.args) - obj = TrustsecVn(self._task.args, ise) + obj = Subscriber(self._task.args, ise) state = self._task.args.get("state") diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py index 349b4bc85..bd392306d 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_bulk_create.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_bulk.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -27,7 +27,8 @@ from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( argument_spec = ise_argument_spec() # Add arguments specific for this module argument_spec.update(dict( - payload=dict(type="list"), + ItemList=dict(type="list"), + operation=dict(type="str"), )) required_if = [] @@ -65,7 +66,8 @@ class ActionModule(ActionBase): def get_object(self, params): new_object = dict( - payload=params.get("payload"), + item_list=params.get("ItemList"), + operation=params.get("operation"), ) return new_object @@ -78,8 +80,8 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) response = ise.exec( - family="sg_vn_mapping", - function="bulk_create_sg_vn_mappings", + family="subscriber", + function="bulk_subscriber_operation", params=self.get_object(self._task.args), ).response diff --git a/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py new file mode 100644 index 000000000..f82cd0d6d --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_imsi_info.py @@ -0,0 +1,98 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + imsi=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = True + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + imsi=params.get("imsi"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + self._result.update(dict(ise_response={})) + + ise = ISESDK(params=self._task.args) + + id = self._task.args.get("imsi") + name = self._task.args.get("name") + if id: + response = ise.exec( + family="subscriber", + function='get_subscriber_by_i_m_s_i', + params=self.get_object(self._task.args) + ).response['response'] + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result + if not name and not id: + # NOTICE: Does not have a get all method or it is in another action + response = None + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py index 42820bc30..65d8cc69c 100644 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/action/subscriber_info.py @@ -1,7 +1,7 @@ #!/usr/bin/env python # -*- coding: utf-8 -*- -# Copyright (c) 2021, Cisco Systems +# Copyright (c) 2023, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) from __future__ import absolute_import, division, print_function @@ -29,11 +29,11 @@ argument_spec = ise_argument_spec() argument_spec.update(dict( page=dict(type="int"), size=dict(type="int"), + filter=dict(type="str"), + filterType=dict(type="str"), sort=dict(type="str"), sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), + subscriberId=dict(type="str"), )) required_if = [] @@ -73,11 +73,11 @@ class ActionModule(ActionBase): new_object = dict( page=params.get("page"), size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), filter=params.get("filter"), filter_type=params.get("filterType"), - id=params.get("id"), + sort=params.get("sort"), + sort_by=params.get("sortBy"), + subscriber_id=params.get("subscriberId"), ) return new_object @@ -91,12 +91,12 @@ class ActionModule(ActionBase): ise = ISESDK(params=self._task.args) - id = self._task.args.get("id") + id = self._task.args.get("subscriberId") name = self._task.args.get("name") if id: response = ise.exec( - family="sg_vn_mapping", - function='get_sg_vn_mapping_by_id', + family="subscriber", + function='get_subscriber_by_id', params=self.get_object(self._task.args) ).response['response'] self._result.update(dict(ise_response=response)) @@ -105,8 +105,8 @@ class ActionModule(ActionBase): if not name and not id: responses = [] generator = ise.exec( - family="sg_vn_mapping", - function='get_sg_vn_mappings_generator', + family="subscriber", + function='get_all_subscribers_generator', params=self.get_object(self._task.args), ) try: diff --git a/ansible_collections/cisco/ise/plugins/action/system_certificate.py b/ansible_collections/cisco/ise/plugins/action/system_certificate.py index 0ca926288..3faae7fec 100644 --- a/ansible_collections/cisco/ise/plugins/action/system_certificate.py +++ b/ansible_collections/cisco/ise/plugins/action/system_certificate.py @@ -121,7 +121,7 @@ class SystemCertificate(object): function="get_system_certificate_by_id", params={"id": id, "host_name": host_name}, handle_func_exception=False, - ).response + ).response['response'] except Exception as e: result = None return result @@ -143,6 +143,18 @@ class SystemCertificate(object): def requires_update(self, current_obj): requested_obj = self.new_object + used_by_value = current_obj.get("usedBy") + if used_by_value is None or used_by_value.lower() == "not in use": + current_obj["eap"] = False + current_obj["pxgrid"] = False + current_obj["radius"] = False + current_obj["ims"] = False + else: + current_obj["eap"] = "eap" in used_by_value.lower() + current_obj["pxgrid"] = "pxgrid" in used_by_value.lower() + current_obj["radius"] = "radius" in used_by_value.lower() + current_obj["ims"] = "ims" in used_by_value.lower() + obj_params = [ ("admin", "admin"), ("allowPortalTagTransferForSameSubject", "allow_portal_tag_transfer_for_same_subject"), @@ -153,7 +165,7 @@ class SystemCertificate(object): ("expirationTTLPeriod", "expiration_ttl_period"), ("expirationTTLUnits", "expiration_ttl_units"), ("ims", "ims"), - ("name", "name"), + ("friendlyName", "name"), ("portal", "portal"), ("portalGroupTag", "portal_group_tag"), ("pxgrid", "pxgrid"), diff --git a/ansible_collections/cisco/ise/plugins/action/test_connector.py b/ansible_collections/cisco/ise/plugins/action/test_connector.py new file mode 100644 index 000000000..f3a1b5797 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/action/test_connector.py @@ -0,0 +1,98 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- + +# Copyright (c) 2023, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type +from ansible.plugins.action import ActionBase + +try: + from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( + AnsibleArgSpecValidator, + ) +except ImportError: + ANSIBLE_UTILS_IS_INSTALLED = False +else: + ANSIBLE_UTILS_IS_INSTALLED = True +from ansible.errors import AnsibleActionFail +from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( + ISESDK, + ise_argument_spec, +) + +# Get common arguements specification +argument_spec = ise_argument_spec() +# Add arguments specific for this module +argument_spec.update(dict( + authType=dict(type="str"), + authValues=dict(type="dict"), + connectorName=dict(type="str"), + responseParsing=dict(type="str"), + uniqueID=dict(type="str"), + url=dict(type="str"), +)) + +required_if = [] +required_one_of = [] +mutually_exclusive = [] +required_together = [] + + +class ActionModule(ActionBase): + def __init__(self, *args, **kwargs): + if not ANSIBLE_UTILS_IS_INSTALLED: + raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") + super(ActionModule, self).__init__(*args, **kwargs) + self._supports_async = False + self._supports_check_mode = False + self._result = None + + # Checks the supplied parameters against the argument spec for this module + def _check_argspec(self): + aav = AnsibleArgSpecValidator( + data=self._task.args, + schema=dict(argument_spec=argument_spec), + schema_format="argspec", + schema_conditionals=dict( + required_if=required_if, + required_one_of=required_one_of, + mutually_exclusive=mutually_exclusive, + required_together=required_together, + ), + name=self._task.action, + ) + valid, errors, self._task.args = aav.validate() + if not valid: + raise AnsibleActionFail(errors) + + def get_object(self, params): + new_object = dict( + auth_type=params.get("authType"), + auth_values=params.get("authValues"), + connector_name=params.get("connectorName"), + response_parsing=params.get("responseParsing"), + unique_id=params.get("uniqueID"), + url=params.get("url"), + ) + return new_object + + def run(self, tmp=None, task_vars=None): + self._task.diff = False + self._result = super(ActionModule, self).run(tmp, task_vars) + self._result["changed"] = False + self._check_argspec() + + ise = ISESDK(params=self._task.args) + + response = ise.exec( + family="edda", + function="test_connector", + params=self.get_object(self._task.args), + ).response + + self._result.update(dict(ise_response=response)) + self._result.update(ise.exit_json()) + return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py deleted file mode 100644 index e0390f20e..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_nbar_app_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="nbar_app", - function='get_nbar_app_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="nbar_app", - function='get_nbar_apps_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py deleted file mode 100644 index f522e9296..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_sg_vn_mapping.py +++ /dev/null @@ -1,267 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, - ise_compare_equality, - get_dict_result, -) -from ansible_collections.cisco.ise.plugins.plugin_utils.exceptions import ( - InconsistentParameters, -) - -# Get common arguments specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - state=dict(type="str", default="present", choices=["present", "absent"]), - id=dict(type="str"), - lastUpdate=dict(type="str"), - sgName=dict(type="str"), - sgtId=dict(type="str"), - vnId=dict(type="str"), - vnName=dict(type="str"), -)) - -required_if = [ - ("state", "present", ["id", "sgName", "vnName"], True), - ("state", "absent", ["id", "sgName", "vnName"], True), -] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class TrustsecSgVnMapping(object): - def __init__(self, params, ise): - self.ise = ise - self.new_object = dict( - id=params.get("id"), - last_update=params.get("lastUpdate"), - sg_name=params.get("sgName"), - sgt_id=params.get("sgtId"), - vn_id=params.get("vnId"), - vn_name=params.get("vnName"), - ) - - def get_object_by_name(self, sg_name, vn_name): - # NOTICE: Get does not support/work for filter by name with EQ - result = None - gen_items_responses = self.ise.exec( - family="sg_vn_mapping", - function="get_sg_vn_mappings_generator" - ) - try: - for items_response in gen_items_responses: - items = items_response.response['response'] - for item in items: - if isinstance(item, dict) and item.get('sgName') == sg_name and item.get('vnName') == vn_name: - result = item - break - if result: - return result - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - return result - return result - - def get_object_by_id(self, id): - try: - result = self.ise.exec( - family="sg_vn_mapping", - function="get_sg_vn_mapping_by_id", - handle_func_exception=False, - params={"id": id} - ).response['response'] - except (TypeError, AttributeError) as e: - self.ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception: - result = None - if isinstance(result, list) and len(result) > 0: - return result[0] - return result - - def exists(self): - id_exists = False - name_exists = False - prev_obj = None - o_id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - if o_id: - prev_obj = self.get_object_by_id(o_id) - id_exists = prev_obj is not None and isinstance(prev_obj, dict) - if not id_exists and sg_name and vn_name: - prev_obj = self.get_object_by_name(sg_name, vn_name) - name_exists = prev_obj is not None and isinstance(prev_obj, dict) - if name_exists: - _id = prev_obj.get("id") - if id_exists and name_exists and o_id != _id: - raise InconsistentParameters("The 'id' and 'name' params don't refer to the same object") - if _id: - prev_obj = self.get_object_by_id(_id) - it_exists = prev_obj is not None and isinstance(prev_obj, dict) - return (it_exists, prev_obj) - - def requires_update(self, current_obj): - requested_obj = self.new_object - - obj_params = [ - ("id", "id"), - ("lastUpdate", "last_update"), - ("sgName", "sg_name"), - ("sgtId", "sgt_id"), - ("vnId", "vn_id"), - ("vnName", "vn_name"), - ] - # Method 1. Params present in request (Ansible) obj are the same as the current (ISE) params - # If any does not have eq params, it requires update - return any(not ise_compare_equality(current_obj.get(ise_param), - requested_obj.get(ansible_param)) - for (ise_param, ansible_param) in obj_params) - - def create(self): - result = self.ise.exec( - family="sg_vn_mapping", - function="create_sg_vn_mapping", - params=self.new_object, - ).response - return result - - def update(self): - id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - result = None - if not id: - id_ = self.get_object_by_name(sg_name, vn_name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="sg_vn_mapping", - function="update_sg_vn_mapping_by_id", - params=self.new_object - ).response - return result - - def delete(self): - id = self.new_object.get("id") - sg_name = self.new_object.get("sg_name") - vn_name = self.new_object.get("vn_name") - result = None - if not id: - id_ = self.get_object_by_name(sg_name, vn_name).get("id") - self.new_object.update(dict(id=id_)) - result = self.ise.exec( - family="sg_vn_mapping", - function="delete_sg_vn_mapping_by_id", - params=self.new_object - ).response - return result - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - obj = TrustsecSgVnMapping(self._task.args, ise) - - state = self._task.args.get("state") - - response = None - - if state == "present": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - if obj.requires_update(prev_obj): - ise_update_response = obj.update() - self._result.update(dict(ise_update_response=ise_update_response)) - (obj_exists, updated_obj) = obj.exists() - response = updated_obj - ise.object_updated() - else: - response = prev_obj - ise.object_already_present() - else: - ise_create_response = obj.create() - (obj_exists, created_obj) = obj.exists() - response = created_obj - ise.object_created() - - elif state == "absent": - (obj_exists, prev_obj) = obj.exists() - if obj_exists: - obj.delete() - response = prev_obj - ise.object_deleted() - else: - ise.object_already_absent() - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py deleted file mode 100644 index d6aed5405..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_delete.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="virtual_network", - function="bulk_delete_virtual_networks", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py deleted file mode 100644 index 4b37b3318..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_bulk_update.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="virtual_network", - function="bulk_update_virtual_networks", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py deleted file mode 100644 index 0029067ea..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="virtual_network", - function='get_virtual_network_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="virtual_network", - function='get_virtual_networks_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py deleted file mode 100644 index 361916f3a..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_create.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_create_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py deleted file mode 100644 index 6cb9d9353..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_delete_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py deleted file mode 100644 index fa6f11edd..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_bulk_update.py +++ /dev/null @@ -1,88 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - payload=dict(type="list"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = False - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - payload=params.get("payload"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - ise = ISESDK(params=self._task.args) - - response = ise.exec( - family="vn_vlan_mapping", - function="bulk_update_vn_vlan_mappings", - params=self.get_object(self._task.args), - ).response - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py deleted file mode 100644 index f99235f74..000000000 --- a/ansible_collections/cisco/ise/plugins/action/trustsec_vn_vlan_mapping_info.py +++ /dev/null @@ -1,141 +0,0 @@ -#!/usr/bin/env python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function - -__metaclass__ = type -from ansible.plugins.action import ActionBase - -try: - from ansible_collections.ansible.utils.plugins.module_utils.common.argspec_validate import ( - AnsibleArgSpecValidator, - ) -except ImportError: - ANSIBLE_UTILS_IS_INSTALLED = False -else: - ANSIBLE_UTILS_IS_INSTALLED = True -from ansible.errors import AnsibleActionFail -from ansible_collections.cisco.ise.plugins.plugin_utils.ise import ( - ISESDK, - ise_argument_spec, -) - -# Get common arguements specification -argument_spec = ise_argument_spec() -# Add arguments specific for this module -argument_spec.update(dict( - page=dict(type="int"), - size=dict(type="int"), - sort=dict(type="str"), - sortBy=dict(type="str"), - filter=dict(type="list"), - filterType=dict(type="str"), - id=dict(type="str"), -)) - -required_if = [] -required_one_of = [] -mutually_exclusive = [] -required_together = [] - - -class ActionModule(ActionBase): - def __init__(self, *args, **kwargs): - if not ANSIBLE_UTILS_IS_INSTALLED: - raise AnsibleActionFail("ansible.utils is not installed. Execute 'ansible-galaxy collection install ansible.utils'") - super(ActionModule, self).__init__(*args, **kwargs) - self._supports_async = False - self._supports_check_mode = True - self._result = None - - # Checks the supplied parameters against the argument spec for this module - def _check_argspec(self): - aav = AnsibleArgSpecValidator( - data=self._task.args, - schema=dict(argument_spec=argument_spec), - schema_format="argspec", - schema_conditionals=dict( - required_if=required_if, - required_one_of=required_one_of, - mutually_exclusive=mutually_exclusive, - required_together=required_together, - ), - name=self._task.action, - ) - valid, errors, self._task.args = aav.validate() - if not valid: - raise AnsibleActionFail(errors) - - def get_object(self, params): - new_object = dict( - page=params.get("page"), - size=params.get("size"), - sort=params.get("sort"), - sort_by=params.get("sortBy"), - filter=params.get("filter"), - filter_type=params.get("filterType"), - id=params.get("id"), - ) - return new_object - - def run(self, tmp=None, task_vars=None): - self._task.diff = False - self._result = super(ActionModule, self).run(tmp, task_vars) - self._result["changed"] = False - self._check_argspec() - - self._result.update(dict(ise_response=[])) - - ise = ISESDK(params=self._task.args) - - id = self._task.args.get("id") - name = self._task.args.get("name") - if id: - response = ise.exec( - family="vn_vlan_mapping", - function='get_vn_vlan_mapping_by_id', - params=self.get_object(self._task.args) - ).response['response'] - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result - if not name and not id: - responses = [] - generator = ise.exec( - family="vn_vlan_mapping", - function='get_vn_vlan_mappings_generator', - params=self.get_object(self._task.args), - ) - try: - for item in generator: - tmp_response = item.response['response'] - if isinstance(tmp_response, list): - responses += tmp_response - else: - responses.append(tmp_response) - response = responses - except (TypeError, AttributeError) as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " Check the configuration of your API Settings and API Gateway settings on your ISE server." - " This collection assumes that the API Gateway, the ERS APIs and OpenAPIs are enabled." - " You may want to enable the (ise_debug: True) argument." - " The error was: {error}" - ).format(error=e) - ) - except Exception as e: - ise.fail_json( - msg=( - "An error occured when executing operation." - " The error was: {error}" - " You may want to enable the (ise_debug: True) argument." - ).format(error=e) - ) - - self._result.update(dict(ise_response=response)) - self._result.update(ise.exit_json()) - return self._result diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py index dfb7ad90a..c115588b3 100644 --- a/ansible_collections/cisco/ise/plugins/doc_fragments/module.py +++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module.py @@ -65,6 +65,12 @@ options: type: bool default: false version_added: '3.0.0' + ise_single_request_timeout: + description: + - Timeout (in seconds) for RESTful HTTP requests. + type: int + default: 60 + version_added: '3.0.0' notes: - "Does not support C(check_mode)" - "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK" diff --git a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py index 57e385ca6..baae22540 100644 --- a/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py +++ b/ansible_collections/cisco/ise/plugins/doc_fragments/module_info.py @@ -65,6 +65,12 @@ options: type: bool default: false version_added: '3.0.0' + ise_single_request_timeout: + description: + - Timeout (in seconds) for RESTful HTTP requests. + type: int + default: 60 + version_added: '3.0.0' notes: - "Supports C(check_mode)" - "The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK" diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py index d08c9ebfb..b8d1afa37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_bindings_info.py @@ -43,7 +43,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py index 3c6e5f13b..b338f5888 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings.py @@ -87,7 +87,7 @@ options: description: ACI Settings's untaggedPacketIepgName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py index 5884b4728..61bad7bbe 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py index 5608cde0c..61d13bf89 100644 --- a/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py +++ b/ansible_collections/cisco/ise/plugins/modules/aci_test_connectivity.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory.py b/ansible_collections/cisco/ise/plugins/modules/active_directory.py index 5fa9d41bf..0cc8e53ec 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory.py @@ -191,7 +191,7 @@ options: alphanumeric and .-_/\\ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py index 298a05eb7..729454376 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_add_groups.py @@ -190,7 +190,7 @@ options: alphanumeric and .-_/\\ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py index 46dd9467c..f0925183c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_groups_by_domain_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -74,7 +74,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py index 5291dfc12..d8e4db519 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py index 2584e6f50..5fbe56eb9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_is_user_member_of_group_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -70,7 +70,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py index b07f435ce..6782bb235 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py index bc2e30553..6dc4da875 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_join_domain_with_all_nodes.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py index 26d847184..4f1e46c87 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py index 787103629..7359c6151 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_leave_domain_with_all_nodes.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py index 748478d72..6974288ac 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_trusted_domains_info.py @@ -21,7 +21,7 @@ options: - Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py index 78692e0fc..2df9027f7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/active_directory_user_groups_info.py @@ -32,7 +32,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -67,7 +67,7 @@ ise_response: { "groups": [ { - "groupName": "string", + "name": "string", "sid": "string", "type": "string" } diff --git a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py index 23c7bc99b..cf793e354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/admin_user_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py index 6a9d3868e..88fa594b4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py +++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols.py @@ -310,7 +310,7 @@ options: type: bool type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py index 69241303d..84b86e5e9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/allowed_protocols_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py index ebb530e2e..f1fde8079 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_apply.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py index 64b14136c..2615a8aff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py index f2d1971d1..3e9037107 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_bulk_request.py @@ -23,7 +23,7 @@ options: description: ANC Endpoint Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py index 371f16a2b..1117dafa2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_clear.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py index 8a198d96c..5a58c8f22 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_endpoint_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py index 67ae179e9..a49bc949f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy.py @@ -33,7 +33,7 @@ options: description: ANC Policy's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py index 1a3f9c081..285529a89 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py index 0161c722a..ea2e59efc 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_bulk_request.py @@ -23,7 +23,7 @@ options: description: ANC Policy Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py index 904267a31..21051ffdf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/anc_policy_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py index b00dd4aa1..75587110f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile.py @@ -174,7 +174,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py index c4b89790a..2b0f7bfcb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/authorization_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py index 421c086d1..11176958d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_cancel.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_config.py index ce5a43eb3..ef5a51df3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_config.py @@ -31,7 +31,7 @@ options: get copied. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py index 9b176d705..7d22a9314 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_last_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py index 1480f8d65..908059a00 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_restore.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_restore.py @@ -30,7 +30,7 @@ options: true, false. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py index 74ab9ab7b..e994d04d2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config.py @@ -57,7 +57,7 @@ options: description: Backup Schedule Config's weekDay. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py index 9babddc26..a8ce5bb2a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py +++ b/ansible_collections/cisco/ise/plugins/modules/backup_schedule_config_update.py @@ -57,7 +57,7 @@ options: description: Backup Schedule Config Update's weekDay. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Backup And Restore diff --git a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py index 74576e8c5..1dcccb2b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/bind_signed_certificate.py @@ -68,7 +68,7 @@ options: description: Validate Certificate Extensions. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py index c3b77fada..b6073d0f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/byod_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal.py @@ -259,7 +259,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py index ed187dfab..530eae753 100644 --- a/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/byod_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py index dcddcd19b..da2bb18b7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile.py @@ -51,7 +51,7 @@ options: - an option only in AD). type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py index d996fb146..ff5eac756 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py index 4d6d0d183..580e85c1a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/certificate_template_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration.py b/ansible_collections/cisco/ise/plugins/modules/configuration.py new file mode 100644 index 000000000..1c551c299 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/configuration.py @@ -0,0 +1,71 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: configuration +short_description: Resource module for Configuration +description: +- Manage operation update of the resource Configuration. +- API to enable/disable LSD settings. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + enableEPO: + description: To enable/disable LSD ownership settings. + type: bool + enableRCM: + description: To enable/disable random mac(RCM) settings. Please note that this flag + will be set to false if enableEPO flag is false. + type: bool +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + configuration.Configuration.update_configuration, + + - Paths used are + put /api/v1/lsd/updateLsdSettings, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.configuration: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enableEPO: true + enableRCM: true + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/configuration_info.py b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py new file mode 100644 index 000000000..6a942dedf --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/configuration_info.py @@ -0,0 +1,51 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: configuration_info +short_description: Information module for Configuration +description: +- Get all Configuration. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + configuration.Configuration.get_configuration, + + - Paths used are + get /api/v1/lsd/updateLsdSettings, + +""" + +EXAMPLES = r""" +- name: Get all Configuration + cisco.ise.configuration_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "enableEPO": true, + "enableRCM": true + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config.py b/ansible_collections/cisco/ise/plugins/modules/connector_config.py new file mode 100644 index 000000000..b374012b1 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/connector_config.py @@ -0,0 +1,305 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: connector_config +short_description: Resource module for Connector Config +description: +- Manage operations create, update and delete of the resource Connector Config. +- EDDA - Configure connectorconfig information. +- EDDA - Delete Configure connectorConfig information based on ConnectorName. +- EDDA - update Configure connectorConfig information based on ConnectorName. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + additionalProperties: + description: Connector Config's additionalProperties. + type: dict + attributes: + description: ConnectorName. + suboptions: + attributeMapping: + description: <p>List of feature names</p>. + elements: dict + suboptions: + dictionaryAttribute: + description: Connector Config's dictionaryAttribute. + type: str + includeInDictionary: + description: IncludeInDictionary flag. + type: bool + jsonAttribute: + description: Connector Config's jsonAttribute. + type: str + type: list + bulkUniqueIdentifier: + description: Uniqueness to identify. + type: str + topLevelObject: + description: Root level of json. + type: str + uniqueIdentifier: + description: Uniqueness to identify. + type: str + versionIdentifier: + description: Version uniqueness to identify. + type: str + type: dict + connectorName: + description: ConnectorName. + type: str + connectorType: + description: Connector Type list. + type: str + deltasyncSchedule: + description: Connector Config's deltasyncSchedule. + suboptions: + interval: + description: Run at interval (hours). + type: int + intervalUnit: + description: Interval Units. + type: str + startDate: + description: Start date and Time. + type: str + type: dict + description: + description: Description. + type: str + enabled: + description: Enabled flag. + type: bool + fullsyncSchedule: + description: Connector Config's fullsyncSchedule. + suboptions: + interval: + description: Run at interval (hours). + type: int + intervalUnit: + description: Interval Units. + type: str + startDate: + description: Start date and Time. + type: str + type: dict + protocol: + description: Protocol. + type: str + skipCertificateValidations: + description: SkipCertificateValidations flag. + type: bool + url: + description: Connector Config's url. + suboptions: + accessKey: + description: Accesskey. + type: str + authenticationType: + description: Authentication Type list. + type: str + bulkUrl: + description: BulkUrl. + type: str + clientId: + description: Clientid. + type: str + clientSecret: + description: Clientsecret. + type: str + incrementalUrl: + description: IncrementalUrl. + type: str + password: + description: Password. + type: str + refreshToken: + description: Refreshtoken. + type: str + tokenHeader: + description: TokenHeader. + type: str + userName: + description: UserName. + type: str + type: dict +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.create_connector_config, + edda.Edda.delete_connector_config_by_connector_name, + edda.Edda.update_connector_config_by_connector_name, + + - Paths used are + post /api/v1/edda/connector-config, + delete /api/v1/edda/connector-config/{connectorName}, + put /api/v1/edda/connector-config/{connectorName}, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + additionalProperties: {} + attributes: + attributeMapping: + - dictionaryAttribute: string + includeInDictionary: true + jsonAttribute: string + bulkUniqueIdentifier: string + topLevelObject: string + uniqueIdentifier: string + versionIdentifier: string + connectorName: string + connectorType: string + deltasyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + description: string + enabled: true + fullsyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + protocol: string + skipCertificateValidations: true + url: + accessKey: string + authenticationType: string + bulkUrl: string + clientId: string + clientSecret: string + incrementalUrl: string + password: string + refreshToken: string + tokenHeader: string + userName: string + +- name: Update by name + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + additionalProperties: {} + attributes: + attributeMapping: + - dictionaryAttribute: string + includeInDictionary: true + jsonAttribute: string + bulkUniqueIdentifier: string + topLevelObject: string + uniqueIdentifier: string + versionIdentifier: string + connectorName: string + connectorType: string + deltasyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + description: string + enabled: true + fullsyncSchedule: + interval: 0 + intervalUnit: string + startDate: string + protocol: string + skipCertificateValidations: true + url: + accessKey: string + authenticationType: string + bulkUrl: string + clientId: string + clientSecret: string + incrementalUrl: string + password: string + refreshToken: string + tokenHeader: string + userName: string + +- name: Delete by name + cisco.ise.connector_config: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: absent + connectorName: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connector": { + "additionalProperties": {}, + "attributes": { + "attributeMapping": [ + { + "dictionaryAttribute": "string", + "includeInDictionary": true, + "jsonAttribute": "string" + } + ], + "bulkUniqueIdentifier": "string", + "topLevelObject": "string", + "uniqueIdentifier": "string", + "versionIdentifier": "string" + }, + "connectorName": "string", + "connectorType": "string", + "deltasyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "description": "string", + "enabled": true, + "fullsyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "protocol": "string", + "skipCertificateValidations": true, + "url": { + "accessKey": "string", + "authenticationType": "string", + "bulkUrl": "string", + "clientId": "string", + "clientSecret": "string", + "incrementalUrl": "string", + "password": "string", + "refreshToken": "string", + "tokenHeader": "string", + "userName": "string" + } + } + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: str + sample: > + "'string'" +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py new file mode 100644 index 000000000..698dd2fd7 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/connector_config_info.py @@ -0,0 +1,111 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: connector_config_info +short_description: Information module for Connector Config +description: +- Get all Connector Config. +- Get Connector Config by name. +- EDDA - Get ALL connectorConfig information. +- EDDA - Get connectorConfig information based on ConnectorName. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: + connectorName: + description: + - ConnectorName path parameter. Update or delete or retrieve the connector config. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.get_connector_config, + edda.Edda.get_connector_config_by_connector_name, + + - Paths used are + get /api/v1/edda/connector-config, + get /api/v1/edda/connector-config/{connectorName}, + +""" + +EXAMPLES = r""" +- name: Get all Connector Config + cisco.ise.connector_config_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +- name: Get Connector Config by name + cisco.ise.connector_config_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + connectorName: string + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connector": { + "additionalProperties": {}, + "attributes": { + "attributeMapping": [ + { + "dictionaryAttribute": "string", + "includeInDictionary": true, + "jsonAttribute": "string" + } + ], + "bulkUniqueIdentifier": "string", + "topLevelObject": "string", + "uniqueIdentifier": "string", + "versionIdentifier": "string" + }, + "connectorName": "string", + "connectorType": "string", + "deltasyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "description": "string", + "enabled": true, + "fullsyncSchedule": { + "interval": 0, + "intervalUnit": "string", + "startDate": "string" + }, + "protocol": "string", + "skipCertificateValidations": true, + "url": { + "accessKey": "string", + "authenticationType": "string", + "bulkUrl": "string", + "clientId": "string", + "clientSecret": "string", + "incrementalUrl": "string", + "password": "string", + "refreshToken": "string", + "tokenHeader": "string", + "userName": "string" + } + } + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py index 13d1f134d..0fc26c12b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_delete.py @@ -10,7 +10,7 @@ module: csr_delete short_description: Resource module for CSR Delete description: - Manage operation delete of the resource CSR Delete. -- This API deletes a Certificate Signing Request of a particular node based on given HostName and ID. +- This API deletes the certificate signing request of a particular node based on a given hostname and ID. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module @@ -24,7 +24,7 @@ options: description: Id path parameter. ID of the Certificate Signing Request to be deleted. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py index a1f8b85e1..4cadca891 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_export_info.py @@ -37,7 +37,7 @@ options: - The filename used to save the download file. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py index 3116b3802..3d769adc0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_generate.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate.py @@ -76,7 +76,7 @@ options: description: CSR Generate's usedFor. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py index f7eaaf20d..b8727a777 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_generate_intermediate_ca.py @@ -10,14 +10,14 @@ module: csr_generate_intermediate_ca short_description: Resource module for CSR Generate Intermediate CA description: - Manage operation create of the resource CSR Generate Intermediate CA. -- CSR Generation for Intermediate Certificates. +- CSR generation for Intermediate Certificates. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/csr_info.py b/ansible_collections/cisco/ise/plugins/modules/csr_info.py index 6dee74b16..3ccee98ed 100644 --- a/ansible_collections/cisco/ise/plugins/modules/csr_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/csr_info.py @@ -69,7 +69,7 @@ options: - Id path parameter. ID of the Certificate Signing Request returned. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py new file mode 100644 index 000000000..3c213e44c --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_info.py @@ -0,0 +1,54 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_info +short_description: Information module for Dataconnect Info +description: +- Get all Dataconnect Info. +- This API retrieves the Dataconnect ODBC details. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.get_odbc_detail, + + - Paths used are + get /api/v1/mnt/data-connect/details, + +""" + +EXAMPLES = r""" +- name: Get all Dataconnect Info + cisco.ise.dataconnect_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "hostname": "string", + "port": 0, + "servicename": "string", + "username": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py new file mode 100644 index 000000000..cbb6aff7e --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_info.py @@ -0,0 +1,54 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_info +short_description: Information module for Dataconnect Settings +description: +- Get all Dataconnect Settings. +- This API retrieves the status of the Dataconnect feature. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.get_dataconnect_service, + + - Paths used are + get /api/v1/mnt/data-connect/settings, + +""" + +EXAMPLES = r""" +- name: Get all Dataconnect Settings + cisco.ise.dataconnect_settings_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "isEnabled": true, + "isPasswordChanged": true, + "passwordExpiresInDays": 0, + "passwordExpiresOn": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py new file mode 100644 index 000000000..4f731bf44 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password.py @@ -0,0 +1,60 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_password +short_description: Resource module for Dataconnect Settings Password +description: +- Manage operation update of the resource Dataconnect Settings Password. +- This API updates the Dataconnect user password. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + password: + description: 'Password for dataconnect user. Password must satisfy the following + criteria - Contains at least one uppercase letter A-Z, Contains at least one lowercase + letter a-z, Contains at least one digit 0-9, Contains at least one special character + #$%&*+,-. ;=?^_~, Has at least 12 characters, Has not more than 30 characters.' + type: str +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.update_dataconnect_password, + + - Paths used are + put /api/v1/mnt/data-connect/settings/password, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.dataconnect_settings_password: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + password: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "success": { + "message": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py new file mode 100644 index 000000000..ec4897b57 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_password_expiry.py @@ -0,0 +1,57 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dataconnect_settings_password_expiry +short_description: Resource module for Dataconnect Settings Password Expiry +description: +- Manage operation update of the resource Dataconnect Settings Password Expiry. +- This API updates the number of days of Dataconnect password expiry. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + passwordExpiresInDays: + description: Dataconnect Settings Password Expiry's passwordExpiresInDays. + type: int +requirements: +- ciscoisesdk >= 2.1.1 +- python >= 3.5 +notes: + - SDK Method used are + dataconnect_services.DataconnectServices.update_dataconnect_password_expiry, + + - Paths used are + put /api/v1/mnt/data-connect/settings/password/expiry, + +""" + +EXAMPLES = r""" +- name: Update all + cisco.ise.dataconnect_settings_password_expiry: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + passwordExpiresInDays: 0 + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "success": { + "message": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py index 88fa0ce86..f782455ec 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/dataconnect_settings_status.py @@ -6,44 +6,39 @@ DOCUMENTATION = r""" --- -module: trustsec_vn_bulk_delete -short_description: Resource module for Trustsec VN Bulk Delete +module: dataconnect_settings_status +short_description: Resource module for Dataconnect Settings Status description: -- Manage operation create of the resource Trustsec VN Bulk Delete. -version_added: '2.0.0' +- Manage operation update of the resource Dataconnect Settings Status. +- This API updates the DataConnect feature status. +version_added: '2.8.0' extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: - payload: - description: Trustsec VN Bulk Delete's payload. - elements: str - type: list + isEnabled: + description: IsEnabled flag. + type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi notes: - SDK Method used are - virtual_network.VirtualNetwork.bulk_delete_virtual_networks, + dataconnect_services.DataconnectServices.set_data_connect_service, - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/delete, + put /api/v1/mnt/data-connect/settings/status, """ EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_delete: +- name: Update all + cisco.ise.dataconnect_settings_status: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" - payload: - - string + isEnabled: true """ @@ -54,6 +49,9 @@ ise_response: type: dict sample: > { - "id": "string" + "success": { + "message": "string" + }, + "version": "string" } """ diff --git a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py index bc2f70749..f09b21d69 100644 --- a/ansible_collections/cisco/ise/plugins/modules/deployment_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/deployment_info.py @@ -21,7 +21,7 @@ options: - How long to wait for the server to send data before giving up. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PullDeploymentInfo diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py index a238380a1..c65a26ede 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py index 29c2db6d3..e0a283492 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules.py @@ -21,6 +21,9 @@ options: id: description: Id path parameter. Rule id. type: str + identitySourceId: + description: Identity source id from the identity stores. + type: str identitySourceName: description: Identity source name from the identity stores. type: str @@ -56,6 +59,9 @@ options: condition: description: Device Administration Authentication Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -102,11 +108,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authentication Rules's endDate. @@ -116,11 +123,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authentication Rules's endDate. @@ -140,8 +148,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authentication Rules's endTime. @@ -152,8 +160,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authentication Rules's endTime. @@ -221,7 +229,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules @@ -248,6 +256,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -259,6 +268,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +321,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present id: string + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -322,6 +333,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -385,6 +397,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -407,6 +420,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -462,6 +476,7 @@ ise_update_response: sample: > { "response": { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -484,6 +499,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py index 3e0dfce6a..6e02cd5b6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authentication_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authentication Rules @@ -73,6 +73,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -95,6 +96,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py index a34b3aec1..b2d3dbb1f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py index 1e5058c66..a762b3923 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules.py @@ -52,6 +52,9 @@ options: condition: description: Device Administration Authorization Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -98,11 +101,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authorization Rules's endDate. @@ -112,11 +116,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Authorization Rules's endDate. @@ -136,8 +141,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authorization Rules's endTime. @@ -148,8 +153,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Authorization Rules's endTime. @@ -217,7 +222,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules @@ -254,6 +259,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -316,6 +322,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -401,6 +408,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -478,6 +486,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py index 8c5f6de1f..8e01d1e0d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_authorization_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Rules @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py index 23aa5817f..46a9cfcfe 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_command_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Command Set diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py index 9db7c229a..e1d2a666f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions.py @@ -20,6 +20,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -65,11 +68,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Conditions's endDate. @@ -79,11 +82,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Conditions's endDate. @@ -102,8 +105,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Conditions's endTime. @@ -113,8 +117,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Conditions's endTime. @@ -159,7 +164,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -190,6 +195,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -235,6 +241,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -289,6 +296,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -356,6 +364,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -414,6 +423,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py index 073e3b888..f071af305 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authentication_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py index e2db57818..1fa414c1a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_authorization_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py index c5add18be..6264730c2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_for_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py index 90657433a..5fbeeac28 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_conditions_info.py @@ -29,7 +29,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Conditions @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py index c603181b9..efcca2198 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authentication_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py index f1685f1ae..90c278c57 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_authorization_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py index 74afbb5d2..14aaba870 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_dictionary_attributes_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py index 6bdd2efe6..a6fb8c2b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules.py @@ -49,6 +49,9 @@ options: condition: description: Device Administration Global Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -95,11 +98,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Global Exception Rules's endDate. @@ -109,11 +113,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Global Exception Rules's endDate. @@ -133,8 +138,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Global Exception Rules's endTime. @@ -145,8 +150,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Global Exception Rules's endTime. @@ -214,7 +219,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules @@ -250,6 +255,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +317,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -395,6 +402,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -472,6 +480,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py index 27f969f61..98b4bf506 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules @@ -89,6 +89,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py index 7a7e1a82a..066bbaf1f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_global_exception_rules_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Global Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py index a0556f723..b870c7121 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_identity_stores_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Identity Stores diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py index 92fe6d8dc..9b86cab32 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules.py @@ -52,6 +52,9 @@ options: condition: description: Device Administration Local Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -98,11 +101,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Local Exception Rules's endDate. @@ -112,11 +116,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Device Administration Local Exception Rules's endDate. @@ -136,8 +141,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Local Exception Rules's endTime. @@ -148,8 +153,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Local Exception Rules's endTime. @@ -217,7 +222,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules @@ -254,6 +259,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -316,6 +322,7 @@ EXAMPLES = r""" profile: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -401,6 +408,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -478,6 +486,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py index cb1cd9142..953ab8564 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py index 8211eb18a..b549075f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_local_exception_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Authorization Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py index 30ade1ac5..67c802d16 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions.py @@ -18,75 +18,37 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + cliDnisList: + description: <p>This field should contain a Caller ID (CLI), comma, and Called ID + (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>. + elements: str + type: list conditionType: description: This field determines the content of the conditions field. type: str - conditions: - description: Device Administration Network Conditions's conditions. - elements: dict - suboptions: - cliDnisList: - description: <p>This field should contain a Caller ID (CLI), comma, and Called - ID (DNIS).<br> Line format - Caller ID (CLI), Called ID (DNIS)</p>. - elements: str - type: list - conditionType: - description: This field determines the content of the conditions field. - type: str - description: - description: Device Administration Network Conditions's description. - type: str - deviceGroupList: - description: <p>This field should contain a tuple with NDG Root, comma, and - an NDG (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>. - elements: str - type: list - deviceList: - description: <p>This field should contain Device-Name,port-number. The device - name must be the same as the name field in a Network Device object.<br> Line - format - Device Name,Port</p>. - elements: str - type: list - id: - description: Device Administration Network Conditions's id. - type: str - ipAddrList: - description: <p>This field should contain IP-address-or-subnet,port number<br> - IP address can be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> - IP subnet can be IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> - Line format - IP Address or subnet,Port</p>. - elements: str - type: list - link: - description: Device Administration Network Conditions's link. - suboptions: - href: - description: Device Administration Network Conditions's href. - type: str - rel: - description: Device Administration Network Conditions's rel. - type: str - type: - description: Device Administration Network Conditions's type. - type: str - type: dict - macAddrList: - description: <p>This field should contain Endstation MAC address, comma, and - Destination MAC addresses.<br> Each Max address must include twelve hexadecimal - digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn - or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>. - elements: str - type: list - name: - description: Network Condition name. - type: str - type: list description: description: Device Administration Network Conditions's description. type: str + deviceGroupList: + description: <p>This field should contain a tuple with NDG Root, comma, and an NDG + (that it under the root).<br> Line format - NDG Root Name, NDG, Port</p>. + elements: str + type: list + deviceList: + description: <p>This field should contain Device Name. The device name must be the + same as the name field in a Network Device object. Line format - Device Name</p>. + elements: str + type: list id: description: Device Administration Network Conditions's id. type: str + ipAddrList: + description: <p>This field should contain IP address or subnet.<br> IP address can + be IPV4 format (n.n.n.n) or IPV6 format (n n n n n n n n).<br> IP subnet can be + IPV4 format (n.n.n.n/m) or IPV6 format (n n n n n n n n/m).<br> Line format - + IP Address or subnet</p>. + elements: str + type: list link: description: Device Administration Network Conditions's link. suboptions: @@ -100,11 +62,18 @@ options: description: Device Administration Network Conditions's type. type: str type: dict + macAddrList: + description: <p>This field should contain Endstation MAC address, comma, and Destination + MAC addresses.<br> Each Max address must include twelve hexadecimal digits using + formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br> + Line format - Endstation MAC,Destination MAC </p>. + elements: str + type: list name: description: Network Condition name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Network Conditions @@ -131,32 +100,23 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + cliDnisList: + - string conditionType: string - conditions: - - cliDnisList: - - string - conditionType: string - description: string - deviceGroupList: - - string - deviceList: - - string - id: string - ipAddrList: - - string - link: - href: string - rel: string - type: string - macAddrList: - - string - name: string description: string + deviceGroupList: + - string + deviceList: + - string id: string + ipAddrList: + - string link: href: string rel: string type: string + macAddrList: + - string name: string - name: Update by id @@ -166,32 +126,23 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + cliDnisList: + - string conditionType: string - conditions: - - cliDnisList: - - string - conditionType: string - description: string - deviceGroupList: - - string - deviceList: - - string - id: string - ipAddrList: - - string - link: - href: string - rel: string - type: string - macAddrList: - - string - name: string description: string + deviceGroupList: + - string + deviceList: + - string id: string + ipAddrList: + - string link: href: string rel: string type: string + macAddrList: + - string name: string - name: Delete by id @@ -221,33 +172,20 @@ ise_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] } @@ -268,33 +206,20 @@ ise_update_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] }, "version": "string" diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py index 318e50bb8..59c2eb239 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_network_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Network Conditions @@ -76,33 +76,20 @@ ise_response: "type": "string" }, "name": "string", - "conditions": [ - { - "cliDnisList": [ - "string" - ], - "conditionType": "string", - "description": "string", - "id": "string", - "ipAddrList": [ - "string" - ], - "link": { - "href": "string", - "rel": "string", - "type": "string" - }, - "macAddrList": [ - "string" - ], - "name": "string", - "deviceGroupList": [ - "string" - ], - "deviceList": [ - "string" - ] - } + "deviceList": [ + "string" + ], + "cliDnisList": [ + "string" + ], + "ipAddrList": [ + "string" + ], + "macAddrList": [ + "string" + ], + "deviceGroupList": [ + "string" ] } """ diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py index b6db2058a..fb0f769a1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set.py @@ -21,6 +21,9 @@ options: condition: description: Device Administration Policy Set's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -66,11 +69,11 @@ options: additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Policy Set's endDate. @@ -80,11 +83,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Policy Set's endDate. @@ -103,8 +106,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Policy Set's endTime. @@ -114,8 +118,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Policy Set's endTime. @@ -205,7 +210,7 @@ options: matched. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set @@ -233,6 +238,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -292,6 +298,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -373,6 +380,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -447,6 +455,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py index c6894900b..fb996df50 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set @@ -79,6 +79,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py index 88893a0d7..609e0b122 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_policy_set_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Policy Set diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py index 2a72e4e98..2aba7c1bd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_profiles_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Profiles diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py index 0cd8de91e..77a27332f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_service_names_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Service Names diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py index 0e115d18a..c5326d8cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions.py @@ -18,6 +18,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -63,11 +66,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Time Date Conditions's endDate. @@ -77,11 +80,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Device Administration Time Date Conditions's endDate. @@ -100,8 +103,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Time Date Conditions's endTime. @@ -111,8 +115,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Device Administration Time Date Conditions's endTime. @@ -157,7 +162,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Time/Date Conditions @@ -184,6 +189,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -229,6 +235,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: diff --git a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py index 55a513840..26c796202 100644 --- a/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/device_administration_time_date_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Device Administration - Time/Date Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py new file mode 100644 index 000000000..85bb07b7b --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/dictionary_references_info.py @@ -0,0 +1,49 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: dictionary_references_info +short_description: Information module for Dictionary References Info +description: +- Get all Dictionary References Info. +- EDDA - Get a map of references to EDDA dictionaries. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: {} +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.get_edda_dictionary_references, + + - Paths used are + get /api/v1/edda/dictionary-references, + +""" + +EXAMPLES = r""" +- name: Get all Dictionary References Info + cisco.ise.dictionary_references_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + {} +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py index 213fcdbd8..f4cd77e29 100644 --- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py +++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl.py @@ -35,7 +35,7 @@ options: characters _.-. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py index 3931cddac..cb35f5056 100644 --- a/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/downloadable_acl_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py index ac0e06b76..15af377c6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell.py @@ -44,7 +44,7 @@ options: description: Egress Matrix Cell's sourceSGtId. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py index a24a81b0a..716e9dad9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py index 88df775ee..dd45607d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_bulk_request.py @@ -23,7 +23,7 @@ options: description: Egress Matrix Cell Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py index 3e3253397..d5edb3ede 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clear_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py index 7dd4fda31..90483a2ea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_clone.py @@ -26,7 +26,7 @@ options: description: SrcSGtId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py index eeb4655a8..309b8f242 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py index 1f416034c..ca6f394eb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py +++ b/ansible_collections/cisco/ise/plugins/modules/egress_matrix_cell_set_all_status.py @@ -20,7 +20,7 @@ options: description: Status path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint.py index 74db5cd17..d6c3db64f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint.py @@ -102,7 +102,7 @@ options: description: StaticProfileAssignment flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -147,6 +147,7 @@ EXAMPLES = r""" mdmReachable: true mdmSerial: string mdmServerName: string + name: string portalUser: string profileId: string staticGroupAssignment: true @@ -189,6 +190,7 @@ EXAMPLES = r""" mdmReachable: true mdmSerial: string mdmServerName: string + name: string portalUser: string profileId: string staticGroupAssignment: true diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py index 520910f40..920378939 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py index dafe2a80c..f74c5d1f6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_bulk_request.py @@ -23,7 +23,7 @@ options: description: Endpoint Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py index 8f31278f4..be6995cbb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_certificate.py @@ -48,7 +48,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointCertificate diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py index 2835d630e..53f050168 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_deregister.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py index a99a9c024..7507f3e70 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_get_rejected_endpoints_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py index 95dd6f659..bf2cf58b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group.py @@ -31,7 +31,7 @@ options: description: SystemDefined flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointIdentityGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py index 89823b7c6..0850f50a4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_group_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for EndpointIdentityGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py index 01587f8b7..88a81827d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py index 139631d20..8807a6b11 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_register.py @@ -100,7 +100,7 @@ options: description: StaticProfileAssignment flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py index 82888e4e8..e86e63d9a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py +++ b/ansible_collections/cisco/ise/plugins/modules/endpoint_release_rejected_endpoint.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py index 50d1ff071..0c16d8c98 100644 --- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py +++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server.py @@ -67,7 +67,7 @@ options: description: Valid Range 1 to 120. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py index 8b597d056..98bb7c155 100644 --- a/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/external_radius_server_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py index 9a23b0c1f..c7b3f5696 100644 --- a/ansible_collections/cisco/ise/plugins/modules/filter_policy.py +++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy.py @@ -35,7 +35,7 @@ options: description: Virtual Network. At least one of subnet or sgt or vn should be defined. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py index 01f9c6e74..486c4c0f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/filter_policy_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py index 2c82fa379..98f77ab17 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_location_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py index 10910f02a..1f7fc6f17 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings.py @@ -54,7 +54,7 @@ options: description: Username of Secure SMTP server. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py index 7f815219d..dec4146c7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_smtp_notification_settings_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py index 8caf673c0..3dac851e9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid.py @@ -26,7 +26,7 @@ options: characters _.-. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py index 087a7e0e4..40cc1eaeb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_ssid_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type.py b/ansible_collections/cisco/ise/plugins/modules/guest_type.py index 2318caaae..4ac0b34d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type.py @@ -120,7 +120,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py index 12b593e2f..9f386a62b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_email.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py index dcf1461ac..9a77176b1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py index d35072caa..08e88c869 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_type_sms.py @@ -31,7 +31,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user.py b/ansible_collections/cisco/ise/plugins/modules/guest_user.py index a19118c76..f65ae8c24 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user.py @@ -115,7 +115,7 @@ options: description: Guest User's statusReason. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py index f5c0295f2..a8aa5dd45 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_approve.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py index f26fe7649..0445a7379 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py index 454b982ae..5542a71ce 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_bulk_request.py @@ -23,7 +23,7 @@ options: description: Guest User Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py index 64dc01930..701c53136 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_change_sponsor_password.py @@ -31,7 +31,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py index b02f5e41c..b4308026a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_deny.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py index f0ba73a22..94fb4f6a2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_email.py @@ -34,7 +34,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py index 651777e00..7713cb784 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py index 0ead09e64..36a8001e0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reinstate.py @@ -24,7 +24,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py index b55a3147c..a544c1707 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_reset_password.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py index d02bd0d38..1c9ffa411 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_sms.py @@ -23,7 +23,7 @@ options: description: PortalId path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py index e53ed5f2d..93c2e0d28 100644 --- a/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py +++ b/ansible_collections/cisco/ise/plugins/modules/guest_user_suspend.py @@ -35,7 +35,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py index 90d37d154..ddc28f545 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py index d4cef09b0..143c1acad 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_install.py @@ -25,7 +25,7 @@ options: description: Hotpatch Install's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py index d1ce43a88..7db0ae257 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotpatch_rollback.py @@ -25,7 +25,7 @@ options: description: Hotpatch Rollback's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py index aa7f55914..f8047fc0c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal.py @@ -251,7 +251,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py index e2cbb7481..fe316031c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/hotspot_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py index 259f25ae9..fa0906397 100644 --- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence.py @@ -48,7 +48,7 @@ options: description: Id Store Sequence's parent. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentitySequence diff --git a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py index 16e99cfb3..1903ae417 100644 --- a/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/id_store_sequence_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentitySequence diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group.py b/ansible_collections/cisco/ise/plugins/modules/identity_group.py index c9e017ada..13dfda39f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/identity_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/identity_group.py @@ -30,7 +30,7 @@ options: description: Identity Group's parent. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py index 460a381e5..c2acbc9d3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/identity_group_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IdentityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user.py b/ansible_collections/cisco/ise/plugins/modules/internal_user.py index 4769df6bb..238b344b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/internal_user.py +++ b/ansible_collections/cisco/ise/plugins/modules/internal_user.py @@ -69,7 +69,7 @@ options: description: The id store where the internal user's password is kept. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py index 7f90f3836..eb6da52de 100644 --- a/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/internal_user_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py index 2eb5f7e01..c61db07fd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py +++ b/ansible_collections/cisco/ise/plugins/modules/ise_root_ca_regenerate.py @@ -21,7 +21,7 @@ options: CSR. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py index f5cbe33a2..46a7b777d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_connection_type_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py index 5f4f2067e..b594f90db 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_eval_license_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py index 282279015..0ecf5b696 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_feature_to_tier_mapping_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py index 297121891..b224fdcc8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_create.py @@ -34,7 +34,7 @@ options: description: Token. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py index 121e10383..d88e0e987 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_registration_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py index 73c71772a..85dcd4876 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_create.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py index 0267753df..e82937305 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_smart_state_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py index b48863dce..fe66204bd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_create.py @@ -28,7 +28,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py index a85e9ea20..11ef62dae 100644 --- a/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/licensing_tier_state_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Licensing diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py index f17ae2533..8a64d0eb2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_account_status_info.py @@ -24,7 +24,7 @@ options: - Duration path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py index 6a6d498fd..fd9138adf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_athentication_status_info.py @@ -28,7 +28,7 @@ options: - RECORDS path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py index fb1b30fb0..5a033a6c9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_authentication_status_info.py @@ -28,7 +28,7 @@ options: - RECORDS path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py index 53e936d10..6ffa6c354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_failure_reasons_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py index c2ffbff89..0a0bf0c25 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py index 352e09bf6..e62b3ef9b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_active_list_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py index 716b60cd0..44685ba33 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_auth_list_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py index f908a7a69..ec45c8782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_ip_info.py @@ -20,7 +20,7 @@ options: - Endpoint_ipv4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py index 754aebbc8..d9a4bcfb3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_mac_info.py @@ -20,7 +20,7 @@ options: - Mac path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py index 09f23798e..d6f0fa959 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_nas_ip_info.py @@ -20,7 +20,7 @@ options: - Nas_ipv4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py index 81c750499..548da9c6b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_by_username_info.py @@ -20,7 +20,7 @@ options: - Username path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py index a9df0152d..63b7fa1aa 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_delete_all.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py index 5f1be8c8f..8de5ed1d5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_disconnect_info.py @@ -36,7 +36,7 @@ options: - NAS_IPV4 path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py index 5c8869a93..774d9709a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_posture_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py index 5a8db7deb..05494c7d6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_profiler_count_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py index d0516ee47..9f1e55b73 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_session_reauthentication_info.py @@ -28,7 +28,7 @@ options: - REAUTH_TYPE path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py index d614bab85..b00af3952 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_sessions_by_session_id_info.py @@ -20,7 +20,7 @@ options: - Session_id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py index 7217600d6..c26efbd54 100644 --- a/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/mnt_version_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py index bdec90ade..5677290f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal.py @@ -275,7 +275,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py index c0c1cd87a..742308c72 100644 --- a/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/my_device_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py index e34a702c8..c250782f3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile.py @@ -48,7 +48,7 @@ options: type: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NativeSupplicantProfile diff --git a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py index f086ded1e..5976821cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/native_supplicant_profile_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NativeSupplicantProfile diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py index 33ea47623..4b3be685e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules.py @@ -21,6 +21,9 @@ options: id: description: Id path parameter. Rule id. type: str + identitySourceId: + description: Identity source id from the identity stores. + type: str identitySourceName: description: Identity source name from the identity stores. type: str @@ -56,6 +59,9 @@ options: condition: description: Network Access Authentication Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -102,11 +108,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authentication Rules's endDate. @@ -116,11 +123,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authentication Rules's endDate. @@ -140,8 +148,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authentication Rules's endTime. @@ -152,8 +160,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authentication Rules's endTime. @@ -221,7 +229,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules @@ -248,6 +256,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -259,6 +268,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -311,6 +321,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present id: string + identitySourceId: string identitySourceName: string ifAuthFail: string ifProcessFail: string @@ -322,6 +333,7 @@ EXAMPLES = r""" policyId: string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -385,6 +397,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -407,6 +420,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -462,6 +476,7 @@ ise_update_response: sample: > { "response": { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -484,6 +499,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py index a41243427..f121dc6f2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules @@ -73,6 +73,7 @@ ise_response: type: dict sample: > { + "identitySourceId": "string", "identitySourceName": "string", "ifAuthFail": "string", "ifProcessFail": "string", @@ -95,6 +96,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py index 1d4de88e7..e3e918c5f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authentication_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authentication Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py index 03b4c64bc..11cb7caff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules.py @@ -47,6 +47,9 @@ options: condition: description: Network Access Authorization Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -93,11 +96,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authorization Rules's endDate. @@ -107,11 +111,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Authorization Rules's endDate. @@ -131,8 +136,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authorization Rules's endTime. @@ -143,8 +148,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Authorization Rules's endTime. @@ -215,7 +220,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules @@ -251,6 +256,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -313,6 +319,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -398,6 +405,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -475,6 +483,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py index ec93647e4..6a5f812d3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules @@ -94,6 +94,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py index 55dfe008f..fc9311404 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_authorization_rules_reset_hitcount.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py index 6321335dd..b5abc72da 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions.py @@ -20,6 +20,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -65,11 +68,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Conditions's endDate. @@ -79,11 +82,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Conditions's endDate. @@ -102,8 +105,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Conditions's endTime. @@ -113,8 +117,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Conditions's endTime. @@ -159,7 +164,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -190,6 +195,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -235,6 +241,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -289,6 +296,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -356,6 +364,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -414,6 +423,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py index bb37744f0..d1977079d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authentication_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py index be93e370a..1c33ff340 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_authorization_rule_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py index a8739b029..eb9d44889 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_for_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -63,6 +63,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py index 79273501d..04f96b355 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_conditions_info.py @@ -29,7 +29,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Conditions @@ -95,6 +95,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py index 161c04bc2..64b1abb37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary.py @@ -47,7 +47,7 @@ options: description: The dictionary version. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py index 4a029c5c9..2572d3833 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute.py @@ -55,7 +55,7 @@ options: description: The dictionary attribute's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attribute diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py index 92346b680..117323aac 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attribute_info.py @@ -27,7 +27,7 @@ options: - Name path parameter. The dictionary attribute name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attribute diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py index fc420dbf0..cf7b71905 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authentication_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py index 88a0a1f00..7325147f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_authorization_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py index 4d82fae8f..07ac1479c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_attributes_policy_set_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary Attributes List diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py index 4334d5172..7ddff701a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_dictionary_info.py @@ -23,7 +23,7 @@ options: - Name path parameter. The dictionary name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Dictionary diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py index 67f0456d5..cb6eb3e48 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules.py @@ -44,6 +44,9 @@ options: condition: description: Network Access Global Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -90,11 +93,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Global Exception Rules's endDate. @@ -104,11 +108,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Global Exception Rules's endDate. @@ -128,8 +133,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Global Exception Rules's endTime. @@ -140,8 +145,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Global Exception Rules's endTime. @@ -212,7 +217,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules @@ -247,6 +252,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -308,6 +314,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -392,6 +399,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -469,6 +477,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py index 168ed354f..e98c99cb6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules @@ -88,6 +88,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py index 8047fc1d5..de070305f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_global_exception_rules_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Global Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py index 5bdc15cf7..50c59b392 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_identity_stores_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Identity Stores diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py index 8f88a5fa3..94bd67b35 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules.py @@ -47,6 +47,9 @@ options: condition: description: Network Access Local Exception Rules's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -93,11 +96,12 @@ options: that additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Local Exception Rules's endDate. @@ -107,11 +111,12 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have + no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy + = year)</p>. suboptions: endDate: description: Network Access Local Exception Rules's endDate. @@ -131,8 +136,8 @@ options: type: str hoursRange: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Local Exception Rules's endTime. @@ -143,8 +148,8 @@ options: type: dict hoursRangeException: description: <p>Defines for which hours a TimeAndDate condition will be - matched<br> Time format - hh mm ( h = hour , mm = minutes ) <br> Default - - All Day </p>. + matched or not matched if used in exceptionHours property<br> Time foramt + - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Local Exception Rules's endTime. @@ -215,7 +220,7 @@ options: description: Security group used in authorization policies. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules @@ -251,6 +256,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -313,6 +319,7 @@ EXAMPLES = r""" - string rule: condition: + attributeId: string attributeName: string attributeValue: string children: @@ -398,6 +405,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -475,6 +483,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py index d93c9bef2..572027db8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_info.py @@ -27,7 +27,7 @@ options: - Id path parameter. Rule id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules @@ -94,6 +94,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py index 25751d4b6..a7e32207d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_local_exception_rules_reset_hitcounts.py @@ -20,7 +20,7 @@ options: description: PolicyId path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Authorization Exception Rules diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py index bbdfb592a..4cf768c5d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition.py @@ -64,17 +64,17 @@ options: type: str type: dict macAddrList: - description: <p>This field should contain Endstation MAC address, comma, and - Destination MAC addresses.<br> Each Max address must include twelve hexadecimal - digits using formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn - or nnnnnnnnnnnn.<br> Line format - Endstation MAC,Destination MAC </p>. + description: <p>This field should contain Endstation MAC address, comma, and Destination + MAC addresses.<br> Each Max address must include twelve hexadecimal digits using + formats nn nn nn nn nn nn or nn-nn-nn-nn-nn-nn or nnnn.nnnn.nnnn or nnnnnnnnnnnn.<br> + Line format - Endstation MAC,Destination MAC </p>. elements: str type: list name: description: Network Condition name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Network Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py index 8d4f5aef7..063585c97 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_network_condition_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Network Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py index 5d7e27b0c..8e98f1cb8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set.py @@ -21,6 +21,9 @@ options: condition: description: Network Access Policy Set's condition. suboptions: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -66,11 +69,11 @@ options: additional conditions are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Policy Set's endDate. @@ -80,11 +83,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used - for start/end date <br> Default - no specific dates<br> In order to reset - the dates to have no specific dates Date format - yyyy-mm-dd (MM = month, - dd = day, yyyy = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched + or NOT matched if used in exceptionDates prooperty<br> Options are - Date + range, for specific date, the same date should be used for start/end date + <br> Default - no specific dates<br> In order to reset the dates to have no + specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Policy Set's endDate. @@ -103,8 +106,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Policy Set's endTime. @@ -114,8 +118,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm + ( h = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Policy Set's endTime. @@ -205,7 +210,7 @@ options: matched. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set @@ -233,6 +238,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -292,6 +298,7 @@ EXAMPLES = r""" ise_verify: "{{ise_verify}}" state: present condition: + attributeId: string attributeName: string attributeValue: string children: @@ -373,6 +380,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", @@ -447,6 +455,7 @@ ise_update_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py index eb1515840..7c5c9d535 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Policy id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set @@ -79,6 +79,7 @@ ise_response: "id": "string", "name": "string", "attributeName": "string", + "attributeId": "string", "attributeValue": "string", "dictionaryName": "string", "dictionaryValue": "string", diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py index 66f6b6ca2..ceda451e8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_policy_set_reset_hitcount.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Policy Set diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py index 74a8ea784..5c954e513 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_profiles_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Profiles diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py index 660fab707..bcb6d16c9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_security_groups_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Security Groups diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py index 3bcb433ad..1f63e6c1c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_service_name_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Service Names diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py index 15d981449..efa5d901c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions.py @@ -18,6 +18,9 @@ extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: + attributeId: + description: Dictionary attribute id (Optional), used for additional verification. + type: str attributeName: description: Dictionary attribute name. type: str @@ -63,11 +66,11 @@ options: are present under the children field</li></ul>. type: str datesRange: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Time Date Conditions's endDate. @@ -77,11 +80,11 @@ options: type: str type: dict datesRangeException: - description: <p>Defines for which date/s TimeAndDate condition will be matched<br> - Options are - Date range, for specific date, the same date should be used for - start/end date <br> Default - no specific dates<br> In order to reset the dates - to have no specific dates Date format - yyyy-mm-dd (MM = month, dd = day, yyyy - = year)</p>. + description: <p>Defines for which date/s TimeAndDate condition will be matched or + NOT matched if used in exceptionDates prooperty<br> Options are - Date range, + for specific date, the same date should be used for start/end date <br> Default + - no specific dates<br> In order to reset the dates to have no specific dates + Date format - yyyy-mm-dd (MM = month, dd = day, yyyy = year)</p>. suboptions: endDate: description: Network Access Time Date Conditions's endDate. @@ -100,8 +103,9 @@ options: description: Dictionary value. type: str hoursRange: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Time Date Conditions's endTime. @@ -111,8 +115,9 @@ options: type: str type: dict hoursRangeException: - description: <p>Defines for which hours a TimeAndDate condition will be matched<br> - Time format - hh mm ( h = hour , mm = minutes ) <br> Default - All Day </p>. + description: <p>Defines for which hours a TimeAndDate condition will be matched + or not matched if used in exceptionHours property<br> Time foramt - hh mm ( h + = hour , mm = minutes ) <br> Default - All Day </p>. suboptions: endTime: description: Network Access Time Date Conditions's endTime. @@ -157,7 +162,7 @@ options: elements: str type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Time/Date Conditions @@ -184,6 +189,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: @@ -229,6 +235,7 @@ EXAMPLES = r""" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" state: present + attributeId: string attributeName: string attributeValue: string children: diff --git a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py index aa22bfe90..eb6ee1b0b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_access_time_date_conditions_info.py @@ -23,7 +23,7 @@ options: - Id path parameter. Condition id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Network Access - Time/Date Conditions diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device.py b/ansible_collections/cisco/ise/plugins/modules/network_device.py index 57a20dade..cde422c7a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device.py @@ -191,7 +191,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py index 7f8850311..8a766835d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py index 0489df3c0..530df579b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_bulk_request.py @@ -23,7 +23,7 @@ options: description: Network Device Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py index 12515718d..d2c17dd56 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group.py @@ -27,11 +27,11 @@ options: name: description: Network Device Group's name. type: str - othername: - description: Network Device Group's othername. + ndgtype: + description: Network Device Group's ndgtype. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -57,7 +57,7 @@ EXAMPLES = r""" description: string id: string name: string - othername: string + ndgtype: string - name: Delete by id cisco.ise.network_device_group: @@ -77,7 +77,7 @@ EXAMPLES = r""" state: present description: string name: string - othername: string + ndgtype: string """ @@ -96,7 +96,7 @@ ise_response: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ise_update_response: diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py index f729d6e40..757237f1d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_group_info.py @@ -73,7 +73,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are @@ -138,7 +138,7 @@ ise_response: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ise_responses: @@ -158,7 +158,7 @@ ise_responses: "href": "string", "type": "string" }, - "othername": "string" + "ndgtype": "string" } ] """ diff --git a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py index 95ef6fce3..36505fec4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/network_device_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/network_device_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py index 4af07b070..237154029 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment.py @@ -42,7 +42,7 @@ options: description: Node Deployment's userName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py index 76363516c..86af43a84 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_info.py @@ -49,7 +49,7 @@ options: - Hostname path parameter. Hostname of the deployed node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py index 5d3d60c9d..fd2e3ecca 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_deployment_sync.py @@ -20,7 +20,7 @@ options: description: Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group.py b/ansible_collections/cisco/ise/plugins/modules/node_group.py index 8e28165f3..04fcc0f7d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group.py @@ -52,7 +52,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py index ee2f50ae4..4fbf7af0f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_info.py @@ -23,7 +23,7 @@ options: - NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py index f57f5233b..6a70be798 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_create.py @@ -23,7 +23,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py index 0097d0c8a..84fc6b947 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_delete.py @@ -23,7 +23,7 @@ options: description: NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py index 46ed0b9e2..a2fbd4294 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_group_node_info.py @@ -21,7 +21,7 @@ options: - NodeGroupName path parameter. Name of the existing node group. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Group diff --git a/ansible_collections/cisco/ise/plugins/modules/node_info.py b/ansible_collections/cisco/ise/plugins/modules/node_info.py index e0ca47517..92e80d782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_info.py @@ -63,7 +63,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for NodeDetails diff --git a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py index e83c1922a..a9d2c776f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_primary_to_standalone.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py index c3c0bf922..8c6582275 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_promotion.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_promotion.py @@ -19,7 +19,7 @@ options: description: Node Promotion's promotionType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py index 86c442d19..430ddc187 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_replication_status_info.py @@ -20,7 +20,7 @@ options: - Node path parameter. ID of the existing node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py index 236082dc5..f837ebfe1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_secondary_to_primary.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py index 893da855f..15d3d06b2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_interfaces_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py index b47eff3a2..1307411ce 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config.py @@ -140,7 +140,7 @@ options: type: int type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py index 106563972..c65326de2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_profiler_probe_config_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py index af5961ad1..fc29dc3e5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces.py @@ -23,7 +23,7 @@ options: description: Node Services SXP Interfaces's interface. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py index fdd2716d0..3c2f925d9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_services_sxp_interfaces_info.py @@ -21,7 +21,7 @@ options: - Hostname path parameter. Hostname of the node. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Services diff --git a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py index c397cb326..67160219b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_standalone_to_primary.py @@ -21,7 +21,7 @@ options: type: str required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Node Deployment diff --git a/ansible_collections/cisco/ise/plugins/modules/node_sync.py b/ansible_collections/cisco/ise/plugins/modules/node_sync.py index e45a0ae17..7389635e4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/node_sync.py +++ b/ansible_collections/cisco/ise/plugins/modules/node_sync.py @@ -19,7 +19,7 @@ options: description: Node Sync's hostname. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py index 0a33b80f7..3029954f9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha.py @@ -31,7 +31,7 @@ options: description: Pan Ha's secondaryHealthCheckNode. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py index 6a6ae62b4..3061000ca 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_info.py @@ -20,7 +20,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PAN HA diff --git a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py index 6f0526a0f..9a8b048b2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py +++ b/ansible_collections/cisco/ise/plugins/modules/pan_ha_update.py @@ -42,7 +42,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PAN HA diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_info.py b/ansible_collections/cisco/ise/plugins/modules/patch_info.py index ec427e641..ba13a4851 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_install.py b/ansible_collections/cisco/ise/plugins/modules/patch_install.py index 94d41ea7e..d2a1bfc92 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_install.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_install.py @@ -25,7 +25,7 @@ options: description: Patch Install's repositoryName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py index f82dc23d3..2838048f8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py +++ b/ansible_collections/cisco/ise/plugins/modules/patch_rollback.py @@ -22,7 +22,7 @@ options: description: Patch Rollback's patchNumber. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Patching diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py index 5c3e74e18..af332d5c2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting.py @@ -23,7 +23,7 @@ options: description: Portal Global Setting's id. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py index e0bc9c260..ae481c4a3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_global_setting_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_info.py index 315df0838..2d9654517 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py index f20992749..8554639f4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_theme.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme.py @@ -31,7 +31,7 @@ options: description: Portal Theme for all portals. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py index eaa5a691e..bc1fb3884 100644 --- a/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/portal_theme_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py index be32314da..9ddd192b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/profiler_profile_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py index 92f4ad27d..a4bb5b688 100644 --- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings.py @@ -35,7 +35,7 @@ options: description: User name for the proxy connection. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for proxy diff --git a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py index d14440bd3..989e22add 100644 --- a/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/proxy_connection_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for proxy diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py index 172dab5fd..8cb0c132b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_approve.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py index a620e17c3..bac63eb41 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_delete.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py index 43f0e9570..7241dcd52 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py index 886991e98..e87b41303 100644 --- a/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/px_grid_settings_auto_approve.py @@ -23,7 +23,7 @@ options: description: Auto approve certificate based accounts when true. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py index dca5b999a..358d777f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_access_secret.py @@ -19,7 +19,7 @@ options: description: pxGrid Access Secret's peerNodeName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py index 8e2571b08..bcb84e34a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_activate.py @@ -19,7 +19,7 @@ options: description: pxGrid Account Activate's description. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py index 4de7c8682..83a6b2f8a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_account_create.py @@ -19,7 +19,7 @@ options: description: pxGrid Account Create's nodeName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py index 7eaf7442e..13022cd27 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_authorization.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py index 9a27324c0..d7d05cf37 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_bindings_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py index 33b2e21e8..2e6450f32 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_matrices_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py index 38f89a6a6..b2024371d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_egress_policies_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py index 49bcc5e50..55e255bc3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoint_by_mac_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py index 15a6ff349..a9c6fa00f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_os_type_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py index bdedd95d3..ef1ddf642 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_by_type_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py index eec046210..9224eb08e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_endpoints_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py index 475b9224d..dc552be6d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_failures_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py index d247161bb..f5963ddf2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_healths_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py index c58e44198..f808e5cc7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_approve.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py index 5248f7a1c..16c42889c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_delete.py @@ -20,7 +20,7 @@ options: description: Name path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py index 19f716365..5da12013d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py index 9f14887ec..f9a4767c1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_performances_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py index 94944e789..687581cea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_profiles_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py index b003c9148..c41be5560 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_group_acls_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py index dd6867c42..2abc51e1e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_security_groups_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py index 5787aecb0..755a1231f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_lookup.py @@ -19,7 +19,7 @@ options: description: pxGrid Service Lookup's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py index c78f2df86..4484573af 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_register.py @@ -19,7 +19,7 @@ options: description: pxGrid Service Register's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py index a79a00ddb..b91798631 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_reregister.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py index f0316a4fd..3926a9960 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_service_unregister.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py index 6260c36ec..df9720cb7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_ip_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py index 6ddea6645..56a5e9204 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_by_mac_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py index c9b3c9751..6e3ca80eb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_session_for_recovery_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py index bf910ac3e..9f0305ab6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_sessions_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py index fb1b90ca8..3203ed0b8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_settings_auto_approve.py @@ -23,7 +23,7 @@ options: description: Auto approve certificate based accounts when true. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py index a7667adb8..e3b54fa92 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_group_by_username_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py index 407c42f89..3add71347 100644 --- a/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/pxgrid_user_groups_info.py @@ -16,7 +16,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py index 6bf112bd0..8031470a4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence.py @@ -103,7 +103,7 @@ options: description: UseAttrSetOnRequest flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py index 91097fdd8..1073928ea 100644 --- a/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/radius_server_sequence_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py index d91ea35b4..a4561a02b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/renew_certificate.py @@ -20,7 +20,7 @@ options: description: Renew Certificate's certType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/repository.py b/ansible_collections/cisco/ise/plugins/modules/repository.py index a9236c8f8..635d1d464 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository.py @@ -45,7 +45,7 @@ options: description: Username may contain alphanumeric and _-./@\\$ characters. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py index c70d8b7b6..32f628688 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository_files_info.py @@ -21,7 +21,7 @@ options: - RepositoryName path parameter. Unique name for a repository. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/repository_info.py b/ansible_collections/cisco/ise/plugins/modules/repository_info.py index 524e63a96..6631f499b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/repository_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/repository_info.py @@ -23,7 +23,7 @@ options: - RepositoryName path parameter. Unique name for a repository. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Repository diff --git a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py index b8989b7be..826afa9c8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/resource_version_info.py @@ -21,7 +21,7 @@ options: - Resource path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py index f39aaf8d9..a91c0b4f8 100644 --- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py +++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store.py @@ -48,6 +48,14 @@ options: description: Suffix of the username domain. type: str type: dict + ersRESTIDStoreUserAttributes: + description: REST Id Store's ersRESTIDStoreUserAttributes. + suboptions: + attributes: + description: REST Id Store's attributes. + elements: str + type: list + type: dict id: description: REST Id Store's id. type: str @@ -55,7 +63,7 @@ options: description: REST Id Store's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.0.1 - python >= 3.5 notes: - SDK Method used are @@ -144,6 +152,9 @@ EXAMPLES = r""" predefined: string rootUrl: string usernameSuffix: string + ersRestIDStoreUserAttributes: + attributes: + - string name: string """ diff --git a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py index f9d5a1cd7..07a3b19e2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/rest_id_store_info.py @@ -71,7 +71,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py index a7b264ffa..81b396660 100644 --- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal.py @@ -682,7 +682,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SelfRegisteredPortal diff --git a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py index 42d009798..5d1952ed7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/self_registered_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SelfRegisteredPortal diff --git a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py index eecd7b549..84be20739 100644 --- a/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py +++ b/ansible_collections/cisco/ise/plugins/modules/selfsigned_certificate_generate.py @@ -119,7 +119,7 @@ options: description: Certificate state (ST). type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py index 59be20e3d..8d531833a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/session_service_node_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for PsnNodeDetailsWithRadiusService diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py index ba6fd695f..8f6d53354 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl.py @@ -43,7 +43,7 @@ options: description: SGACL's name. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py index d23f90b52..814837559 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py index 7ffae3189..79dd73025 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_bulk_request.py @@ -23,7 +23,7 @@ options: description: SGACL Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py index 3ea64a8bf..b3c4cae7c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_acl_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupsACLs diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py index 8bd08e3aa..9d27da3cb 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping.py @@ -44,7 +44,7 @@ options: description: Mandatory unless mappingGroup is set. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py index 6814106ac..c0988da7c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py index aa8d7f738..c3298c551 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG Mapping Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py index d40159d18..97b9c2368 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py index 20686b4ca..317037a5b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py index 605873b86..40a7adb84 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_deploy_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py index 2f20a7967..6b6d7fcd0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group.py @@ -34,7 +34,7 @@ options: description: Mandatory unless mappingGroup is set. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py index 856788bf7..cd6af8a56 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py index f8f97da73..18ed1150d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG Mapping Group Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py index 2b35f9ba2..1012ababc 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy.py @@ -20,7 +20,7 @@ options: description: Id path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py index 666c65d77..08b7223e2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_all.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py index 3f3cf6adf..f02d6260a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_deploy_status_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py index 725b00d80..c05b582ff 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_group_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMappingGroup diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py index 3ebb64ac7..cc46a2d6a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_mapping_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for IPToSGTMapping diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py index 4fb8805fc..bba7eeb3a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan.py @@ -71,7 +71,7 @@ options: type: list type: list requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py index b97da0a72..ceebe7245 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py index 958cf4055..c466ec4a7 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_bulk_request.py @@ -23,7 +23,7 @@ options: description: SG To VN To VLAN Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py index 18394741f..5759bcbdf 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sg_to_vn_to_vlan_info.py @@ -57,7 +57,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroupToVirtualNetwork diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt.py b/ansible_collections/cisco/ise/plugins/modules/sgt.py index c7d7e013b..7d65c2e9a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt.py @@ -46,7 +46,7 @@ options: type: int required: true requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py index f8776d485..29ffa4038 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py index c295c10b8..6afae3073 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_bulk_request.py @@ -23,7 +23,7 @@ options: description: SGt Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py index 0e483e947..98190f097 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sgt_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sgt_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SecurityGroups diff --git a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py index 6b6beed7c..38175a56e 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sms_provider_info.py @@ -59,7 +59,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py index e684f9371..be39a7e2c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group.py @@ -120,7 +120,7 @@ options: type: bool type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py index b6892c6fa..88e4f9599 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py index c49c76f41..4d782aa71 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_group_member_info.py @@ -59,7 +59,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py index 22b53b5fa..6acb22f0f 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal.py @@ -281,7 +281,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py index 8fafce1d2..9c51373f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsor_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py index 85f386446..e8f99c386 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal.py @@ -385,7 +385,7 @@ options: type: dict type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py index d4e2649a6..017236454 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sponsored_guest_portal_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber.py b/ansible_collections/cisco/ise/plugins/modules/subscriber.py new file mode 100644 index 000000000..e62fe2c55 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber.py @@ -0,0 +1,150 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber +short_description: Resource module for Subscriber +description: +- Manage operations create, update and delete of the resource Subscriber. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + enabled: + description: Subscriber is enabled or not. + type: bool + friendlyName: + description: Friendly name for the subscriber. + type: str + identityGroups: + description: Identity Group(s). With more than one idGroups it needs to be comma + seperated. + type: str + imeis: + description: IMEI to be attached to the subscriber. + type: str + imsi: + description: IMSI for Subscriber. + type: str + ki: + description: KI. + type: str + opc: + description: OPC. + type: str + subscriberId: + description: SubscriberId path parameter. Unique id for a subscriber object. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.create_subscriber, + subscriber.Subscriber.delete_subscriber, + subscriber.Subscriber.update_subscriber, + + - Paths used are + post /api/v1/fiveg/subscriber, + delete /api/v1/fiveg/subscriber/{subscriberId}, + put /api/v1/fiveg/subscriber/{subscriberId}, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enabled: true + friendlyName: string + identityGroups: string + imeis: string + imsi: string + ki: string + opc: string + +- name: Update by id + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: present + enabled: true + friendlyName: string + identityGroups: string + imeis: string + ki: string + opc: string + subscriberId: string + +- name: Delete by id + cisco.ise.subscriber: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + state: absent + subscriberId: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } + +ise_update_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "response": { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + }, + "version": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py new file mode 100644 index 000000000..2b6547097 --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_bulk.py @@ -0,0 +1,92 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber_bulk +short_description: Resource module for Subscriber Bulk +description: +- Manage operation create of the resource Subscriber Bulk. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + ItemList: + description: Subscriber Bulk's ItemList. + elements: dict + suboptions: + enabled: + description: Subscriber is enabled or not. + type: bool + friendlyName: + description: Friendly name for the subscriber. + type: str + id: + description: Subscriber Bulk's id. + type: str + identityGroups: + description: Identity Group(s). With more than one idGroups it needs to be comma + seperated. + type: str + imeis: + description: Comma separated IMEIs to be attached to the subscriber. + type: str + imsi: + description: IMSI for Subscriber. + type: str + ki: + description: KI. + type: str + opc: + description: OPC. + type: str + type: list + operation: + description: Subscriber Bulk's operation. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.bulk_subscriber_operation, + + - Paths used are + post /api/v1/fiveg/subscriber/bulk, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.subscriber_bulk: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + ItemList: + - enabled: true + friendlyName: string + id: string + identityGroups: string + imeis: string + imsi: string + ki: string + opc: string + operation: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "id": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py new file mode 100644 index 000000000..4da62a78f --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_imsi_info.py @@ -0,0 +1,69 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: subscriber_imsi_info +short_description: Information module for Subscriber Imsi Info +description: +- Get Subscriber Imsi Info by id. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module_info +author: Rafael Campos (@racampos) +options: + imsi: + description: + - Imsi path parameter. IMSI parameter. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + subscriber.Subscriber.get_subscriber_by_i_m_s_i, + + - Paths used are + get /api/v1/fiveg/subscriber/imsi/{imsi}, + +""" + +EXAMPLES = r""" +- name: Get Subscriber Imsi Info by id + cisco.ise.subscriber_imsi_info: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + imsi: string + register: result + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py index 7c877bc3c..660937786 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/subscriber_info.py @@ -6,14 +6,12 @@ DOCUMENTATION = r""" --- -module: trustsec_vn_info -short_description: Information module for Trustsec VN +module: subscriber_info +short_description: Information module for Subscriber description: -- Get all Trustsec VN. -- Get Trustsec VN by id. -- Get Virtual Network by id. -- Get all Virtual Networks. -version_added: '2.0.0' +- Get all Subscriber. +- Get Subscriber by id. +version_added: '2.8.0' extends_documentation_fragment: - cisco.ise.module_info author: Rafael Campos (@racampos) @@ -26,14 +24,6 @@ options: description: - Size query parameter. Number of objects returned per page. type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str filter: description: - > @@ -52,58 +42,61 @@ options: - The 'NENDSW' operator describes 'Not Ends With'. - The 'CONTAINS' operator describes 'Contains'. - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list + type: str filterType: description: - > FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and can be changed by using the parameter. type: str - id: + sort: + description: + - Sort query parameter. Sort type - asc or desc. + type: str + sortBy: + description: + - SortBy query parameter. Sort column by which objects needs to be sorted. + type: str + subscriberId: description: - - Id path parameter. + - SubscriberId path parameter. Unique id for a subscriber object. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.0.1 - python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi notes: - SDK Method used are - virtual_network.VirtualNetwork.get_virtual_network_by_id, - virtual_network.VirtualNetwork.get_virtual_networks_generator, + subscriber.Subscriber.get_all_subscribers_generator, + subscriber.Subscriber.get_subscriber_by_id, - Paths used are - get /api/v1/trustsec/virtualnetwork, - get /api/v1/trustsec/virtualnetwork/{id}, + get /api/v1/fiveg/subscriber, + get /api/v1/fiveg/subscriber/{subscriberId}, """ EXAMPLES = r""" -- name: Get all Trustsec VN - cisco.ise.trustsec_vn_info: +- name: Get all Subscriber + cisco.ise.subscriber_info: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" page: 0 size: 0 + filter: string + filterType: string sort: string sortBy: string - filter: [] - filterType: string register: result -- name: Get Trustsec VN by id - cisco.ise.trustsec_vn_info: +- name: Get Subscriber by id + cisco.ise.subscriber_info: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" - id: string + subscriberId: string register: result """ @@ -112,17 +105,25 @@ RETURN = r""" ise_response: description: A dictionary or list with the response returned by the Cisco ISE Python SDK returned: always - type: list - elements: dict + type: dict sample: > - [ - { - "additionalAttributes": "string", - "id": "string", - "lastUpdate": "string", - "name": "string" - } - ] + { + "createTime": "string", + "enabled": true, + "friendlyName": "string", + "id": "string", + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" + } ise_responses: description: A dictionary or list with the response returned by the Cisco ISE Python SDK @@ -132,10 +133,21 @@ ise_responses: sample: > [ { - "additionalAttributes": "string", + "createTime": "string", + "enabled": true, + "friendlyName": "string", "id": "string", - "lastUpdate": "string", - "name": "string" + "identityGroups": "string", + "imeis": "string", + "imsi": "string", + "ki": "string", + "link": { + "href": "string", + "rel": "string", + "type": "string" + }, + "opc": "string", + "updateTime": "string" } ] """ diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py index 81aaf5bf6..cd29a5b31 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle.py @@ -57,7 +57,7 @@ options: type: str type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for SupportBundleTriggerConfiguration diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py index c6b8b4635..952d9fcf3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_download.py @@ -29,7 +29,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py index 0cdb8aaf9..67fd177d2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/support_bundle_status_info.py @@ -31,7 +31,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py index 544a65b80..53a6ec262 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections.py @@ -46,7 +46,7 @@ options: description: SXP Connections's sxpVpn. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py index bfa5183c0..dfcbb8eb2 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py index 02ca9ce03..3e62f2782 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP Connections Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py index 08a50da5f..42e979779 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_connections_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py index 5eff2ab4e..a403670fd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings.py @@ -42,7 +42,7 @@ options: or vns should be defined. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py index 3cb621af3..f34f4741c 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py index 374def105..66b5e0ab1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP Local Bindings Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py index 0c422a495..15aeaf5e3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_local_bindings_info.py @@ -65,7 +65,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py index 0b7a88dce..abab51624 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns.py @@ -24,7 +24,7 @@ options: description: SXP VPNs's sxpVpnName. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py index 9ec5a6fbc..d749941ab 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_monitor_status_info.py @@ -21,7 +21,7 @@ options: - Bulkid path parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py index 0c8e957c6..0d24fbc94 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_bulk_request.py @@ -23,7 +23,7 @@ options: description: SXP VPNs Bulk Request's resourceMediaType. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py index 0b233c134..4fffbfc4a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/sxp_vpns_info.py @@ -65,7 +65,7 @@ options: - Sortdsc query parameter. Sort desc. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py index 6022b8d32..f2dd7a73b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate.py @@ -78,7 +78,7 @@ options: description: Use certificate for SAML Signing. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py index 758318611..916142bb3 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_create.py @@ -88,7 +88,7 @@ options: description: NodeId of Cisco ISE application. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py index 793eaea33..e53c17a3a 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_export_info.py @@ -35,7 +35,7 @@ options: description: Enable or disable automatic file creation of raw response. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py index 9cb9d3301..72f69d078 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_import.py @@ -81,7 +81,7 @@ options: description: Validate certificate extensions. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py index 9c05839cb..7d90d10d4 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_certificate_info.py @@ -69,7 +69,7 @@ options: - Id path parameter. ID of the system certificate. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py index cbff1e720..2213574f0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/system_config_version_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for VersionAndPatch diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py index 461d03bda..af3075c13 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets.py @@ -49,7 +49,7 @@ options: description: PermitUnmatched flag. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py index 59398596d..4aa4f9be9 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_command_sets_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py index 51d311bf0..2d724e764 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers.py @@ -43,7 +43,7 @@ options: description: The server timeout. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py index 5759de015..d097fcf25 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_external_servers_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py index 8cb53b9be..304caaabd 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile.py @@ -46,7 +46,7 @@ options: type: list type: dict requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py index a64d0f257..59f1495f6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_profile_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py index 0f9669f0f..e26adf0ae 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence.py @@ -50,7 +50,7 @@ options: description: Define if a delimiter will be used for suffix strip. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py index 618b4c59f..69d4424b0 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tacacs_server_sequence_info.py @@ -37,7 +37,7 @@ options: - Size query parameter. Number of objects returned per page. type: int requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 notes: - SDK Method used are diff --git a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py index 98dabd3dc..b038c6e9d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/tasks_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/tasks_info.py @@ -21,7 +21,7 @@ options: - TaskId path parameter. The id of the task executed before. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for tasks diff --git a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py index 4393577aa..089d885d1 100644 --- a/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/telemetry_info.py @@ -57,7 +57,7 @@ options: can be changed by using the parameter. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for TelemetryInformation diff --git a/ansible_collections/cisco/ise/plugins/modules/test_connector.py b/ansible_collections/cisco/ise/plugins/modules/test_connector.py new file mode 100644 index 000000000..4caaadc4b --- /dev/null +++ b/ansible_collections/cisco/ise/plugins/modules/test_connector.py @@ -0,0 +1,87 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# Copyright (c) 2021, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +DOCUMENTATION = r""" +--- +module: test_connector +short_description: Resource module for Test Connector +description: +- Manage operation create of the resource Test Connector. +- EDDA - test the Connector. +version_added: '2.8.0' +extends_documentation_fragment: + - cisco.ise.module +author: Rafael Campos (@racampos) +options: + authType: + description: Authentication Type list. + type: str + authValues: + description: Request to test Connector. + suboptions: + password: + description: Password. + type: str + userName: + description: UserName. + type: str + type: dict + connectorName: + description: ConnectorName. + type: str + responseParsing: + description: Uniqueness to identify. + type: str + uniqueID: + description: Uniqueness to identify. + type: str + url: + description: BulkUrl. + type: str +requirements: +- ciscoisesdk >= 2.0.1 +- python >= 3.5 +notes: + - SDK Method used are + edda.Edda.test_connector, + + - Paths used are + post /api/v1/edda/test-connector, + +""" + +EXAMPLES = r""" +- name: Create + cisco.ise.test_connector: + ise_hostname: "{{ise_hostname}}" + ise_username: "{{ise_username}}" + ise_password: "{{ise_password}}" + ise_verify: "{{ise_verify}}" + authType: string + authValues: + password: string + userName: string + connectorName: string + responseParsing: string + uniqueID: string + url: string + +""" + +RETURN = r""" +ise_response: + description: A dictionary or list with the response returned by the Cisco ISE Python SDK + returned: always + type: dict + sample: > + { + "connectorName": "string", + "data": "string", + "error": "string", + "status": "string", + "uniqueID": "string" + } +""" diff --git a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py index 853c23ade..6288b13c6 100644 --- a/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py +++ b/ansible_collections/cisco/ise/plugins/modules/threat_vulnerabilities_clear.py @@ -20,7 +20,7 @@ options: description: Threat Vulnerabilities Clear's macAddresses. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for ClearThreatsAndVulnerabilities diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py index 1db63b6e8..9b7012f3b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py +++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings.py @@ -23,7 +23,7 @@ options: description: URL of transport gateway. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for telemetry diff --git a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py index a5f69c026..404d01827 100644 --- a/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/transport_gateway_settings_info.py @@ -17,7 +17,7 @@ extends_documentation_fragment: author: Rafael Campos (@racampos) options: {} requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for telemetry diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py index d93fd1dee..abe3948a5 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate.py @@ -91,7 +91,7 @@ options: description: Trust for authentication within Cisco ISE. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py index 7912ff872..640dffb3b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_export_info.py @@ -10,7 +10,7 @@ module: trusted_certificate_export_info short_description: Information module for Trusted Certificate Export description: - Get Trusted Certificate Export by id. -- The response of this API carries a trusted certificate file mapped to the. +- The response of this API carries a trusted certificate file mapped to the requested ID. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module_info @@ -33,7 +33,7 @@ options: - The filename used to save the download file. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py index 795ddb27c..a03c7d41d 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_import.py @@ -50,7 +50,7 @@ options: description: Validate trust certificate extension. type: bool requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py index fceb4f0ca..198e0539b 100644 --- a/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py +++ b/ansible_collections/cisco/ise/plugins/modules/trusted_certificate_info.py @@ -65,7 +65,7 @@ options: - Id path parameter. ID of the trust certificate. type: str requirements: -- ciscoisesdk >= 2.0.8 +- ciscoisesdk >= 2.1.1 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py deleted file mode 100644 index d82685f21..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app.py +++ /dev/null @@ -1,130 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_nbar_app -short_description: Resource module for Trustsec NBAR App -description: -- Manage operations create, update and delete of the resource Trustsec NBAR App. -- Create NBAR application. -- Update NBAR Application. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - description: - description: Trustsec NBAR App's description. - type: str - id: - description: Trustsec NBAR App's id. - type: str - name: - description: Trustsec NBAR App's name. - type: str - networkIdentities: - description: Array of NIs. - elements: dict - suboptions: - ports: - description: Trustsec NBAR App's ports. - type: str - protocol: - description: Trustsec NBAR App's protocol. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for nbarApp - description: Complete reference of the nbarApp API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - nbar_app.NbarApp.create_nbar_app, - nbar_app.NbarApp.delete_nbar_app_by_id, - nbar_app.NbarApp.update_nbar_app_by_id, - - - Paths used are - post /api/v1/trustsec/sgacl/nbarapp, - delete /api/v1/trustsec/sgacl/nbarapp/{id}, - put /api/v1/trustsec/sgacl/nbarapp/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - description: string - id: string - name: string - networkIdentities: - - ports: string - protocol: string - -- name: Update by id - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - description: string - id: string - name: string - networkIdentities: - - ports: string - protocol: string - -- name: Delete by id - cisco.ise.trustsec_nbar_app: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py deleted file mode 100644 index 9c2b732b9..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_nbar_app_info.py +++ /dev/null @@ -1,151 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_nbar_app_info -short_description: Information module for Trustsec NBAR App -description: -- Get all Trustsec NBAR App. -- Get Trustsec NBAR App by id. -- Get NBAR Application by id. -- Get all NBAR Applications. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for nbarApp - description: Complete reference of the nbarApp API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - nbar_app.NbarApp.get_nbar_app_by_id, - nbar_app.NbarApp.get_nbar_apps_generator, - - - Paths used are - get /api/v1/trustsec/sgacl/nbarapp, - get /api/v1/trustsec/sgacl/nbarapp/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec NBAR App - cisco.ise.trustsec_nbar_app_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec NBAR App by id - cisco.ise.trustsec_nbar_app_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "description": "string", - "id": "string", - "name": "string", - "networkIdentities": [ - { - "ports": "string", - "protocol": "string" - } - ] - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py deleted file mode 100644 index b9c65804b..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping.py +++ /dev/null @@ -1,130 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping -short_description: Resource module for Trustsec SG VN Mapping -description: -- Manage operations create, update and delete of the resource Trustsec SG VN Mapping. -- Create Security Group and Virtual Network mapping. -- Delete Security Group and Virtual Network mapping. -- Update Security Group and Virtual Network mapping. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if id - is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required unless - its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity if id - is not provided. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.create_sg_vn_mapping, - sg_vn_mapping.SgVnMapping.delete_sg_vn_mapping_by_id, - sg_vn_mapping.SgVnMapping.update_sg_vn_mapping_by_id, - - - Paths used are - post /api/v1/trustsec/sgvnmapping, - delete /api/v1/trustsec/sgvnmapping/{id}, - put /api/v1/trustsec/sgvnmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -- name: Update by id - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -- name: Delete by id - cisco.ise.trustsec_sg_vn_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py deleted file mode 100644 index 2adb8f02a..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_create.py +++ /dev/null @@ -1,87 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_create -short_description: Resource module for Trustsec SG VN Mapping Bulk Create -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Create's payload. - elements: dict - suboptions: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if - id is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_create_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py deleted file mode 100644 index b5d8b48de..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_delete.py +++ /dev/null @@ -1,59 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_delete -short_description: Resource module for Trustsec SG VN Mapping Bulk Delete -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Delete. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Delete's payload. - elements: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_delete_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/delete, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_delete: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py deleted file mode 100644 index 05b1a97e3..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_bulk_update.py +++ /dev/null @@ -1,87 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_bulk_update -short_description: Resource module for Trustsec SG VN Mapping Bulk Update -description: -- Manage operation create of the resource Trustsec SG VN Mapping Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec SG VN Mapping Bulk Update's payload. - elements: dict - suboptions: - id: - description: Identifier of the SG-VN mapping. - type: str - lastUpdate: - description: Timestamp for the last update of the SG-VN mapping. - type: str - sgName: - description: Name of the associated Security Group to be used for identity if - id is not provided. - type: str - sgtId: - description: Identifier of the associated Security Group which is required unless - its name is provided. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.bulk_update_sg_vn_mappings, - - - Paths used are - post /api/v1/trustsec/sgvnmapping/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_sg_vn_mapping_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - lastUpdate: string - sgName: string - sgtId: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py deleted file mode 100644 index 3ac8cb0c9..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_sg_vn_mapping_info.py +++ /dev/null @@ -1,145 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_sg_vn_mapping_info -short_description: Information module for Trustsec SG VN Mapping -description: -- Get all Trustsec SG VN Mapping. -- Get Trustsec SG VN Mapping by id. -- Get Security Group and Virtual Network mapping by id. -- Get all Security Group and Virtual Network mappings. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for sgVnMapping - description: Complete reference of the sgVnMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - sg_vn_mapping.SgVnMapping.get_sg_vn_mapping_by_id, - sg_vn_mapping.SgVnMapping.get_sg_vn_mappings_generator, - - - Paths used are - get /api/v1/trustsec/sgvnmapping, - get /api/v1/trustsec/sgvnmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec SG VN Mapping - cisco.ise.trustsec_sg_vn_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec SG VN Mapping by id - cisco.ise.trustsec_sg_vn_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "lastUpdate": "string", - "sgName": "string", - "sgtId": "string", - "vnId": "string", - "vnName": "string" - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py deleted file mode 100644 index 7bd274ee2..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn.py +++ /dev/null @@ -1,113 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn -short_description: Resource module for Trustsec VN -description: -- Manage operations create, update and delete of the resource Trustsec VN. -- Create Virtual Network. -- Update Virtual Network. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.create_virtual_network, - virtual_network.VirtualNetwork.delete_virtual_network_by_id, - virtual_network.VirtualNetwork.update_virtual_network_by_id, - - - Paths used are - post /api/v1/trustsec/virtualnetwork, - delete /api/v1/trustsec/virtualnetwork/{id}, - put /api/v1/trustsec/virtualnetwork/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - additionalAttributes: string - id: string - lastUpdate: string - name: string - -- name: Update by id - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - additionalAttributes: string - id: string - lastUpdate: string - name: string - -- name: Delete by id - cisco.ise.trustsec_vn: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "additionalAttributes": "string", - "id": "string", - "lastUpdate": "string", - "name": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py deleted file mode 100644 index 3893db42a..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_create.py +++ /dev/null @@ -1,75 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_bulk_create -short_description: Resource module for Trustsec VN Bulk Create -description: -- Manage operation create of the resource Trustsec VN Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN Bulk Create's payload. - elements: dict - suboptions: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.bulk_create_virtual_networks, - - - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - additionalAttributes: string - id: string - lastUpdate: string - name: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py deleted file mode 100644 index c823d303c..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_bulk_update.py +++ /dev/null @@ -1,75 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_bulk_update -short_description: Resource module for Trustsec VN Bulk Update -description: -- Manage operation create of the resource Trustsec VN Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN Bulk Update's payload. - elements: dict - suboptions: - additionalAttributes: - description: JSON String of additional attributes for the Virtual Network. - type: str - id: - description: Identifier of the Virtual Network. - type: str - lastUpdate: - description: Timestamp for the last update of the Virtual Network. - type: str - name: - description: Name of the Virtual Network. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for virtualNetwork - description: Complete reference of the virtualNetwork API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - virtual_network.VirtualNetwork.bulk_update_virtual_networks, - - - Paths used are - post /api/v1/trustsec/virtualnetwork/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - additionalAttributes: string - id: string - lastUpdate: string - name: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py deleted file mode 100644 index 712c562be..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping.py +++ /dev/null @@ -1,139 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping -short_description: Resource module for Trustsec VN VLAN Mapping -description: -- Manage operations create, update and delete of the resource Trustsec VN VLAN Mapping. -- Create VN-Vlan Mapping. -- Update VN-Vlan Mapping. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required unless - its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity if id - is not provided. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.create_vn_vlan_mapping, - vn_vlan_mapping.VnVlanMapping.delete_vn_vlan_mapping_by_id, - vn_vlan_mapping.VnVlanMapping.update_vn_vlan_mapping_by_id, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping, - delete /api/v1/trustsec/vnvlanmapping/{id}, - put /api/v1/trustsec/vnvlanmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -- name: Update by id - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: present - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -- name: Delete by id - cisco.ise.trustsec_vn_vlan_mapping: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - state: absent - id: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_update_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "code": 0, - "message": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py deleted file mode 100644 index bbe8e5980..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_create.py +++ /dev/null @@ -1,93 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_create -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Create -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Create. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Create's payload. - elements: dict - suboptions: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_create_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/create, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_create: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py deleted file mode 100644 index 88a6c1e34..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_delete.py +++ /dev/null @@ -1,59 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_delete -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Delete -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Delete. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Delete's payload. - elements: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_delete_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/delete, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_delete: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py deleted file mode 100644 index e99b6f6d5..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_bulk_update.py +++ /dev/null @@ -1,93 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_bulk_update -short_description: Resource module for Trustsec VN VLAN Mapping Bulk Update -description: -- Manage operation create of the resource Trustsec VN VLAN Mapping Bulk Update. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module -author: Rafael Campos (@racampos) -options: - payload: - description: Trustsec VN VLAN Mapping Bulk Update's payload. - elements: dict - suboptions: - id: - description: Identifier of the VN-VLAN Mapping. - type: str - isData: - description: Flag which indicates whether the VLAN is data or voice type. - type: bool - isDefaultVLAN: - description: Flag which indicates if the VLAN is default. - type: bool - lastUpdate: - description: Timestamp for the last update of the VN-VLAN Mapping. - type: str - maxValue: - description: Max value. - type: int - name: - description: Name of the VLAN. - type: str - vnId: - description: Identifier for the associated Virtual Network which is required - unless its name is provided. - type: str - vnName: - description: Name of the associated Virtual Network to be used for identity - if id is not provided. - type: str - type: list -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.bulk_update_vn_vlan_mappings, - - - Paths used are - post /api/v1/trustsec/vnvlanmapping/bulk/update, - -""" - -EXAMPLES = r""" -- name: Create - cisco.ise.trustsec_vn_vlan_mapping_bulk_update: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - payload: - - id: string - isData: true - isDefaultVlan: true - lastUpdate: string - maxValue: 0 - name: string - vnId: string - vnName: string - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: dict - sample: > - { - "id": "string" - } -""" diff --git a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py b/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py deleted file mode 100644 index c6047e4ee..000000000 --- a/ansible_collections/cisco/ise/plugins/modules/trustsec_vn_vlan_mapping_info.py +++ /dev/null @@ -1,149 +0,0 @@ -#!/usr/bin/python -# -*- coding: utf-8 -*- - -# Copyright (c) 2021, Cisco Systems -# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) - -DOCUMENTATION = r""" ---- -module: trustsec_vn_vlan_mapping_info -short_description: Information module for Trustsec VN VLAN Mapping -description: -- Get all Trustsec VN VLAN Mapping. -- Get Trustsec VN VLAN Mapping by id. -- Get VN-Vlan Mapping by id. -- Get all VN-Vlan Mappings. -version_added: '2.0.0' -extends_documentation_fragment: - - cisco.ise.module_info -author: Rafael Campos (@racampos) -options: - page: - description: - - Page query parameter. Page number. - type: int - size: - description: - - Size query parameter. Number of objects returned per page. - type: int - sort: - description: - - Sort query parameter. Sort type - asc or desc. - type: str - sortBy: - description: - - SortBy query parameter. Sort column by which objects needs to be sorted. - type: str - filter: - description: - - > - Filter query parameter. .. Container **Simple filtering** should be available through the filter query - string parameter. The structure of a filter is a triplet of field operator and value separated with dots. - More than one filter can be sent. The logical operator common to ALL filter criteria will be by default AND, - and can be changed by using the *"filterType=or"* query string parameter. - - Each resource Data model description should specify if an attribute is a filtered field. - - The 'EQ' operator describes 'Equals'. - - The 'NEQ' operator describes 'Not Equals'. - - The 'GT' operator describes 'Greater Than'. - - The 'LT' operator describes 'Less Than'. - - The 'STARTSW' operator describes 'Starts With'. - - The 'NSTARTSW' operator describes 'Not Starts With'. - - The 'ENDSW' operator describes 'Ends With'. - - The 'NENDSW' operator describes 'Not Ends With'. - - The 'CONTAINS' operator describes 'Contains'. - - The 'NCONTAINS' operator describes 'Not Contains'. - elements: str - type: list - filterType: - description: - - > - FilterType query parameter. The logical operator common to ALL filter criteria will be by default AND, and - can be changed by using the parameter. - type: str - id: - description: - - Id path parameter. - type: str -requirements: -- ciscoisesdk >= 2.0.8 -- python >= 3.5 -seealso: -- name: Cisco ISE documentation for vnVlanMapping - description: Complete reference of the vnVlanMapping API. - link: https://developer.cisco.com/docs/identity-services-engine/v1/#!trustsec-openapi -notes: - - SDK Method used are - vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mapping_by_id, - vn_vlan_mapping.VnVlanMapping.get_vn_vlan_mappings_generator, - - - Paths used are - get /api/v1/trustsec/vnvlanmapping, - get /api/v1/trustsec/vnvlanmapping/{id}, - -""" - -EXAMPLES = r""" -- name: Get all Trustsec VN VLAN Mapping - cisco.ise.trustsec_vn_vlan_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - page: 0 - size: 0 - sort: string - sortBy: string - filter: [] - filterType: string - register: result - -- name: Get Trustsec VN VLAN Mapping by id - cisco.ise.trustsec_vn_vlan_mapping_info: - ise_hostname: "{{ise_hostname}}" - ise_username: "{{ise_username}}" - ise_password: "{{ise_password}}" - ise_verify: "{{ise_verify}}" - id: string - register: result - -""" - -RETURN = r""" -ise_response: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] - -ise_responses: - description: A dictionary or list with the response returned by the Cisco ISE Python SDK - returned: always - type: list - elements: dict - sample: > - [ - { - "id": "string", - "isData": true, - "isDefaultVlan": true, - "lastUpdate": "string", - "maxValue": 0, - "name": "string", - "vnId": "string", - "vnName": "string" - } - ] -""" diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py index 2a2dce924..fbb0843c2 100644 --- a/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py +++ b/ansible_collections/cisco/ise/plugins/plugin_utils/ise.py @@ -13,7 +13,7 @@ except ImportError: ISE_SDK_IS_INSTALLED = False else: ISE_SDK_IS_INSTALLED = True -from ansible.module_utils.basic import AnsibleModule, env_fallback +from ansible.module_utils.basic import env_fallback try: from ansible.errors import AnsibleActionFail @@ -133,11 +133,12 @@ def ise_argument_spec(): ise_username=dict(type="str", fallback=(env_fallback, ['ISE_USERNAME']), required=True), ise_password=dict(type="str", fallback=(env_fallback, ['ISE_PASSWORD']), required=True, no_log=True), ise_verify=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_VERIFY'])), - ise_version=dict(type="str", default="3.1_Patch_1", fallback=(env_fallback, ['ISE_VERSION'])), + ise_version=dict(type="str", default="3.2_beta", fallback=(env_fallback, ['ISE_VERSION'])), ise_wait_on_rate_limit=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_WAIT_ON_RATE_LIMIT'])), ise_uses_api_gateway=dict(type="bool", default=True, fallback=(env_fallback, ['ISE_USES_API_GATEWAY'])), ise_uses_csrf_token=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_USES_CSRF_TOKEN'])), ise_debug=dict(type="bool", default=False, fallback=(env_fallback, ['ISE_DEBUG'])), + ise_single_request_timeout=dict(type="int", default=60, fallback=(env_fallback, ['ISE_SINGLE_REQUEST_TIMEOUT'])), ) return argument_spec @@ -172,6 +173,7 @@ class ISESDK(object): ers_base_url=ers_base_url, mnt_base_url=mnt_base_url, px_grid_base_url=px_grid_base_url, + single_request_timeout=params.get("ise_single_request_timeout"), verify=params.get("ise_verify"), version=params.get("ise_version"), wait_on_rate_limit=params.get("ise_wait_on_rate_limit"), diff --git a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py index 1f30a10c7..6fb4e2744 100644 --- a/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py +++ b/ansible_collections/cisco/ise/plugins/plugin_utils/personas_utils.py @@ -144,7 +144,7 @@ class Node(object): try: response = requests.post(url=url, timeout=15, data=data, headers=headers, auth=(self.username, self.password), verify=False) except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if not response.status_code == 200: raise AnsibleActionFail("Received status code {status_code} when exporting certificate.".format(status_code=str(response.status_code))) @@ -175,7 +175,7 @@ class Node(object): ) return_message = json.loads(response.text)["response"]["message"] except Exception as e: - AnsibleActionFail(e) + raise AnsibleActionFail(e) if not response.status_code == 200: if not (return_message == 'Trust certificate was added successfully' or diff --git a/ansible_collections/cisco/ise/requirements.txt b/ansible_collections/cisco/ise/requirements.txt index 2fdf7846e..010de3983 100644 --- a/ansible_collections/cisco/ise/requirements.txt +++ b/ansible_collections/cisco/ise/requirements.txt @@ -1,2 +1,2 @@ -ciscoisesdk >= 2.0.8 +ciscoisesdk >= 2.1.1 requests >= 2.25.1 diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt index 2482cbb3f..944c6f3e9 100644 --- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt +++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.10.txt @@ -366,23 +366,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK @@ -749,20 +747,18 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file +plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt index 0b0a4e409..52fcd2e86 100644 --- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt +++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.11.txt @@ -1,5 +1,20 @@ plugins/plugin_utils/ise.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/plugin_utils/ise.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/plugin_utils/ise.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_bindings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/aci_settings.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK @@ -367,23 +382,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK @@ -750,23 +763,6 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_bindings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK @@ -1133,20 +1129,18 @@ plugins/action/trusted_certificate.py import-2.7 # Python 2.7 is not supported b plugins/action/trusted_certificate_export_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file +plugins/action/connector_config_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py import-2.7 # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt new file mode 100644 index 000000000..e69de29bb --- /dev/null +++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.15.txt diff --git a/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt b/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt index 2482cbb3f..944c6f3e9 100644 --- a/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt +++ b/ansible_collections/cisco/ise/tests/sanity/ignore-2.9.txt @@ -366,23 +366,21 @@ plugins/action/trusted_certificate.py compile-2.6!skip # Python 2.6 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.6!skip # Python 2.6 is not supported by the Cisco ISE SDK plugins/action/aci_bindings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/aci_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK @@ -749,20 +747,18 @@ plugins/action/trusted_certificate.py compile-2.7!skip # Python 2.7 is not suppo plugins/action/trusted_certificate_export_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_import.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK plugins/action/trusted_certificate_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_nbar_app_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_sg_vn_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_create.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_delete.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_bulk_update.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK -plugins/action/trustsec_vn_vlan_mapping_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file +plugins/action/connector_config_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/connector_config.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dictionary_references_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/test_connector.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/configuration.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password_expiry.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_password.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/dataconnect_settings_status.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_bulk.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK +plugins/action/subscriber_imsi_info.py compile-2.7!skip # Python 2.7 is not supported by the Cisco ISE SDK
\ No newline at end of file |